CVE-2024-22232 The advisory has been revoked - it doesn't affect any version of package salt  (opens in a new tab)


Threat Intelligence

EPSS
0.32% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-SALT-7411357
  • published28 Jun 2024
  • disclosed27 Jun 2024

Introduced: 27 Jun 2024

CVE-2024-22232  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream salt package and not the salt package as distributed by Debian.

A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.