SaltStack, Arbitrary Directory Creation/File Deletion, CVE-2025-XXXXX (Moderate)

Listen to this Post

How the CVE Works

The vulnerability exists in SaltStack’s GitFS `find_file` method, where user-controlled input from the `tgt_env` variable is passed directly to `os.path.join` without validation. An attacker can manipulate this input to traverse directories (../) and either delete arbitrary files or create unauthorized directories on the Salt Master server. Since the Master process typically runs with elevated privileges, this could lead to system compromise, configuration tampering, or service disruption.

DailyCVE Form

Platform: SaltStack
Version: 3006.0rc1-3006.11, 3007.0rc1-3007.3
Vulnerability: Path Traversal
Severity: Moderate
Date: Jun 13, 2025

Prediction: Patch expected by Jun 20, 2025

What Undercode Say

Check Salt Master version
salt --versions-report | grep Salt
Exploit PoC (simulated path traversal)
curl -X POST http://salt-master/gitfs -d 'tgt_env=../../../etc/passwd'
Mitigation (temporary workaround)
chmod 700 /etc/salt/gitfs

How Exploit

  • Attacker crafts malicious `tgt_env` payload with `../` sequences.
  • Payload bypasses path sanitization in GitFS backend.
  • Salt Master processes request, deleting/creating files at attacker-specified locations.

Protection from this CVE

  • Upgrade to SaltStack 3006.12 or 3007.4.
  • Restrict GitFS environment names to alphanumeric chars.
  • Run Salt Master with least-privilege permissions.

Impact

  • Unauthorized file deletion/modification.
  • Privilege escalation potential.
  • Master service disruption.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top