An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 13 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
ssvc
|
Fri, 13 Jun 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process. | |
| Title | CVE-2025-22237 salt advisory | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published: 2025-06-13T06:55:39.704Z
Updated: 2025-06-14T03:56:05.071Z
Reserved: 2025-01-02T04:30:06.833Z
Link: CVE-2025-22237
Updated: 2025-06-13T13:52:54.401Z
Status : Awaiting Analysis
Published: 2025-06-13T07:15:21.010
Modified: 2025-06-16T12:32:18.840
Link: CVE-2025-22237
No data.