SaltStack, Directory Traversal, CVE-2025-XXXXX (Moderate)

Listen to this Post

How the CVE Works

The vulnerability (CVE-2025-XXXXX) in SaltStack allows directory traversal attacks during minion file cache creation. The master’s default cache fails to properly sanitize user-supplied paths, enabling attackers to manipulate file paths using `../` sequences. This could allow writing or overwriting files outside the intended cache directory. The flaw arises due to insufficient validation when processing cached files, permitting unauthorized filesystem access. Exploitation requires minion access, but successful attacks could lead to arbitrary file writes, configuration tampering, or further system compromise.

DailyCVE Form

Platform: SaltStack
Version: 3006.0rc1-3006.11, 3007.0rc1-3007.3
Vulnerability: Directory Traversal
Severity: Moderate
Date: Jun 13, 2025

Prediction: Patch by Jun 20, 2025

What Undercode Say

Check Salt version
salt --versions-report
Exploit PoC (simulated traversal)
curl -X POST -d "../../evil_file" http://salt-master/cache
Mitigation test
grep "file_cache_path" /etc/salt/master

How Exploit

1. Minion sends malformed path (`../../../target/file`).

2. Master caches file outside restricted directory.

3. Attacker overwrites critical system files.

Protection from this CVE

  • Update to Salt 3006.12/3007.4.
  • Restrict minion cache permissions.
  • Audit file_cache_path configurations.

Impact

  • Arbitrary file writes.
  • Privilege escalation.
  • Configuration hijacking.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top