Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-22241

Опубликовано: 13 июн. 2025
Источник: debian
EPSS Низкий

Описание

File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
saltremovedpackage

EPSS

Процентиль: 12%
0.00039
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
7 месяцев назад

File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.

CVSS3: 5.6
nvd
7 месяцев назад

File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.

CVSS3: 5.6
github
7 месяцев назад

Salt's file contents overwrite the VirtKey class

CVSS3: 5.6
fstec
около 1 года назад

Уязвимость функции VirtKey системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю обойти установленные ограничения безопасности

suse-cvrf
6 месяцев назад

Security update for salt

EPSS

Процентиль: 12%
0.00039
Низкий