CVE-2025-22242

medium

Description

Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.

References

https://docs.saltproject.io/en/3007/topics/releases/3007.4.html

https://docs.saltproject.io/en/3006/topics/releases/3006.12.html

Details

Source: Mitre, NVD

Published: 2025-06-13

Updated: 2025-06-13

Risk Information

CVSS v2

Base Score: 5.3

Vector: CVSS2#AV:L/AC:H/Au:M/C:C/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.6

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018