VYPR

PyPI package

salt

pkg:pypi/salt

Vulnerabilities (66)

  • CVE-2025-62349MedJan 30, 2026
    affected >= 3006.12, < 3006.17fixed 3006.17

    Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to p

  • CVE-2025-62348HigJan 30, 2026
    affected < 3006.17fixed 3006.17

    Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

  • CVE-2025-22242MedJun 13, 2025
    affected >= 3007.0rc1, < 3007.4fixed 3007.4

    Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this

  • CVE-2025-22241MedJun 13, 2025
    affected >= 3007.0rc1, < 3007.4fixed 3007.4

    File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a sp

  • CVE-2025-22240MedJun 13, 2025
    affected >= 3007.0rc1, < 3007.4fixed 3007.4

    Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the “tgt_env” variable. This can be exploited by an attacker to delete any file on the Master's process has permissions to.

  • CVE-2025-22239HigJun 13, 2025
    affected >= 3006.0rc1, < 3006.12fixed 3006.12

    Arbitrary event injection on Salt Master. The master's "_minion_event" method can be used by and authorized minion to send arbitrary events onto the master's event bus.

  • CVE-2025-22238MedJun 13, 2025
    affected >= 3006.0rc1, < 3006.12fixed 3006.12

    Directory traversal attack in minion file cache creation. The master's default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite 'cache' files outside of the cache directory.

  • CVE-2025-22237MedJun 13, 2025
    affected >= 3006.0rc1, < 3006.12fixed 3006.12

    An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

  • CVE-2025-22236HigJun 13, 2025
    affected >= 3007.0, < 3007.4fixed 3007.4

    Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (>= 3007.0).

  • CVE-2024-38825MedJun 13, 2025
    affected >= 3006.0rc1, < 3006.12fixed 3006.12

    The salt.auth.pki module does not properly authenticate callers. The "password" field contains a public certificate which is validated against a CA certificate by the module. This is not pki authentication, as the caller does not need access to the corresponding private key for t

  • CVE-2024-38824Jun 13, 2025
    affected >= 3007.0rc1, < 3007.4fixed 3007.4

    Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.

  • CVE-2023-34049MedNov 14, 2024
    affected < 3005.4fixed 3005.4

    The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH run

  • CVE-2024-22232HigJun 27, 2024
    affected < 3005.5fixed 3005.5

    A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.

  • CVE-2024-22231MedJun 27, 2024
    affected < 3005.5fixed 3005.5

    Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.

  • CVE-2023-20898Sep 5, 2023
    affected < 3005.2fixed 3005.2

    Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data di

  • CVE-2023-20897Sep 5, 2023
    affected < 3005.2fixed 3005.2

    Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.

  • CVE-2022-22967Jun 22, 2022
    affected < 3002.9fixed 3002.9

    An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell acc

  • CVE-2022-22941Mar 29, 2022
    affected < 3002.8fixed 3002.8

    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no vali

  • CVE-2022-22936Mar 29, 2022
    affected < 3002.8fixed 3002.8

    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be r

  • CVE-2022-22935Mar 29, 2022
    affected < 3002.8fixed 3002.8

    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.

Page 1 of 4