CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
5.1%
Salt is vulnerable to Symlink attacks. The vulnerability is due to insecure creation of temporary files in seed.py
,salt-ssh
, or salt-cloud
, which allows a local attacker to exploit this by creating symbolic links to overwrite arbitrary files with elevated privileges.