CVE-2024-22231

5.0 MEDIUM

📋 TL;DR

This vulnerability allows an attacker to create arbitrary directories on a Salt master via directory traversal in the syndic cache directory creation. It affects Salt masters running vulnerable versions, potentially enabling further attacks.

💻 Affected Systems

Products:
  • Salt Project
Versions: Salt versions before 3006.10 and 3007.4
Operating Systems: All supported platforms (Linux, Windows, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Salt masters with syndic cache functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could create directories in sensitive locations, potentially leading to privilege escalation, data manipulation, or denial of service by filling disk space.

🟠

Likely Case

Directory creation in non-critical locations, enabling reconnaissance or preparation for follow-on attacks.

🟢

If Mitigated

Limited impact if proper file permissions and network segmentation restrict access to the Salt master.

🌐 Internet-Facing: MEDIUM - Requires network access to the Salt master's syndic interface, which may be exposed.
🏢 Internal Only: MEDIUM - Internal attackers with network access to the Salt master could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the Salt master's syndic interface and knowledge of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Salt 3006.10 or 3007.4

Vendor Advisory: https://saltproject.io/security-announcements/2024-01-31-advisory/

Restart Required: Yes

Instructions:

1. Backup your Salt configuration. 2. Upgrade Salt to version 3006.10 or 3007.4 using your package manager (e.g., 'apt upgrade salt-master' or 'yum update salt-master'). 3. Restart the Salt master service (e.g., 'systemctl restart salt-master').

🔧 Temporary Workarounds

Disable syndic cache

all

Temporarily disable the syndic cache functionality to mitigate the vulnerability.

Edit Salt master config to set 'syndic_cache: false' and restart salt-master

🧯 If You Can't Patch

  • Restrict network access to the Salt master's syndic interface using firewalls.
  • Implement strict file permissions and monitor for unauthorized directory creation.

🔍 How to Verify

Check if Vulnerable:

Check Salt version with 'salt --version' or 'salt-master --version'. If version is below 3006.10 or 3007.4, it is vulnerable.

Check Version:

salt --version

Verify Fix Applied:

After patching, verify version is 3006.10 or 3007.4 or higher with 'salt --version'.

📡 Detection & Monitoring

Log Indicators:

  • Unusual directory creation events in Salt master logs
  • Errors related to syndic cache operations

Network Indicators:

  • Unexpected connections to the Salt master's syndic port (default 4506)

SIEM Query:

source="salt-master.log" AND ("directory creation" OR "syndic_cache")

🔗 References

📤 Share & Export