Path traversal in Salt - CVE-2018-15750

 

Path traversal in Salt - CVE-2018-15750

Published: October 25, 2018 / Updated: October 26, 2018


Vulnerability identifier: #VU15544
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-15750
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: SaltStack
Affected software:
Salt

Detailed vulnerability description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input processed by the salt-api component. A remote attacker can send a query request that submits malicious input, conduct directory traversal attack and determine what files exist on the system, and this information can be used to conduct further attacks.


How to mitigate CVE-2018-15750

The vulnerability has been addressed in the versions 2017.7.8, 2018.3.3.

Sources