SaltStack, Directory Traversal, CVE-2025-XXXX (Critical)

Listen to this Post

How the CVE Works

The vulnerability (CVE-2025-XXXX) in SaltStack stems from insufficient path validation in the `recv_file` method, allowing attackers to perform directory traversal attacks. By manipulating file paths, an authenticated attacker can write arbitrary files to the master cache directory. This could lead to remote code execution (RCE) if combined with other exploits, as the master server runs with elevated privileges. The flaw affects Salt versions >= 3007.0rc1 (< 3007.4) and >= 3006.0rc1 (< 3006.12). Attackers exploit this by sending crafted file paths containing `../` sequences, bypassing directory restrictions.

DailyCVE Form

Platform: SaltStack
Version: 3006.0rc1-3006.11
Vulnerability: Directory Traversal
Severity: Critical
Date: Jun 13, 2025

Prediction: Patch by Jun 20, 2025

What Undercode Say

salt-call --local file.read /etc/passwd
salt-run fileserver.update
Exploit PoC (simplified)
import salt.client
client = salt.client.LocalClient()
client.cmd('target', 'file.recv', ['../../malicious_file'])

How Exploit

  • Authenticated attacker sends malicious file path.
  • Path traversal bypasses restrictions.
  • Arbitrary file written to master cache.

Protection from this CVE

  • Upgrade to 3006.12 or 3007.4.
  • Restrict Salt master access.
  • Monitor file writes.

Impact

  • Remote code execution (RCE).
  • Unauthorized file access.
  • Master server compromise.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top