Search CVE reports


Toggle filters

1 – 10 of 71 results


CVE-2025-22242

Medium priority
Needs evaluation

Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then...

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2025-22241

Medium priority
Needs evaluation

File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys...

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2025-22240

Medium priority
Needs evaluation

Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the “tgt_env” variable. This can be exploited by an attacker to delete...

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2025-22239

Medium priority
Needs evaluation

Arbitrary event injection on Salt Master. The master's "_minion_event" method can be used by and authorized minion to send arbitrary events onto the master's event bus.

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2025-22238

Medium priority
Needs evaluation

Directory traversal attack in minion file cache creation. The master's default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite 'cache' files outside of the cache directory.

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2025-22237

Medium priority
Needs evaluation

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2025-22236

Medium priority
Needs evaluation

Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (>= 3007.0).

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2024-38825

Medium priority
Needs evaluation

The salt.auth.pki module does not properly authenticate callers. The "password" field contains a public certificate which is validated against a CA certificate by the module. This is not pki authentication, as the caller does not...

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2024-38824

Medium priority
Needs evaluation

Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2024-38823

Medium priority
Needs evaluation

Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport.

1 affected package

salt

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
salt Not in release Needs evaluation Needs evaluation
Show less packages