Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html | release notes vendor advisory |
https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html | release notes vendor advisory |
https://groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ | mailing list third party advisory release notes |
https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ | mailing list third party advisory release notes |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html | vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00024.html | mailing list |
https://usn.ubuntu.com/4459-1/ | vendor advisory |