Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45381
HistoryFeb 06, 2024 - 5:59 p.m.

Path Traversal

2024-02-0617:59:45
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9
path traversal
vulnerability
salt software
file manipulation
validation
user input

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

salt is vulnerable to Path Traversal. The vulnerability is caused by roots.py because there is no explicit path validation before performing file operations, as well as master.py creating directories and files based on unvalidated user input. An attacker can exploit these flaws to traverse and manipulate the file system outside of the intended boundaries.

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%