EUVD-2024-54682

| CVE-2024-38824 CRITICAL
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 14, 2026 - 21:34 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:34 euvd
EUVD-2024-54682
CVE Published
Jun 13, 2025 - 08:15 nvd
CRITICAL 9.6

Description

Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.

Analysis

Directory traversal vulnerability in the recv_file method that permits authenticated attackers to write arbitrary files to the master cache directory, potentially leading to code execution or system compromise. The vulnerability affects products using vulnerable file reception mechanisms and carries a critical CVSS 9.6 score with network accessibility and low complexity. While specific KEV/EPSS data was not provided in the intelligence briefing, the combination of high CVSS, low attack complexity, and authenticated-but-common access vectors suggests elevated real-world risk.

Technical Context

This vulnerability exploits improper input validation in the recv_file method, classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory - 'Path Traversal'). The root cause involves insufficient sanitization of file paths before writing to the cache directory, allowing attackers to use path traversal sequences (e.g., '../', '..\') to escape the intended directory boundary and write files to arbitrary locations within the master cache filesystem. The affected technology likely involves distributed computing, caching systems, or remote file transfer protocols where multiple nodes interact with shared cache directories. Without specific CPE data provided, the vulnerability appears to impact cache management systems or similar infrastructure components that handle file operations across trust boundaries.

Affected Products

Specific product names, versions, and CPE strings were not provided in the intelligence briefing. However, based on the vulnerability description, affected products likely include: distributed cache systems, remote file transfer components, master-slave computing architectures, or cluster management software that implements recv_file functionality. To identify specific affected products, vendor security advisories and CVE/CPE databases (NVD, vendor security pages) should be consulted. Organizations should search their environment for: systems implementing 'recv_file' methods, software with cache directory operations, and authenticated file transfer mechanisms that may lack path traversal protections.

Remediation

1) IMMEDIATE: Identify and inventory all systems running software with vulnerable recv_file implementations. 2) PATCH: Apply vendor security updates as released (specific patch versions not provided in briefing—consult vendor advisories directly). 3) WORKAROUNDS (if patches unavailable): Implement strict input validation on all file path parameters before reaching recv_file, enforce chroot/jail restrictions on cache directory access, use allowlist-based path validation rejecting '../' and similar sequences, implement filesystem-level protections (read-only parent directories, restrictive permissions). 4) DETECTION: Monitor for HTTP requests/protocol messages containing path traversal sequences ('../', '..\', Unicode encodings) targeting recv_file endpoints; audit cache directory for unexpected files. 5) ACCESS CONTROL: Restrict authentication credentials for cache systems; implement network segmentation limiting access to cache directories.

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +48
POC: 0

Vendor Status

Ubuntu

Priority: Medium
salt
Release Status Version
trusty needs-triage -
xenial needs-triage -
bionic needs-triage -
jammy needs-triage -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -

Debian

salt
Release Status Fixed Version Urgency
(unstable) fixed (unfixed) -

Share

EUVD-2024-54682 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy