VYPR
Medium severity5.3NVD Advisory· Published Apr 13, 2017· Updated May 13, 2026

CVE-2015-1838

CVE-2015-1838

Description

modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
saltPyPI
< 2014.7.42014.7.4

Affected products

2

Patches

1
e11298d7155e

Move install.sh to cachedir for serverdensity_device

https://github.com/saltstack/saltColton MyersMar 25, 2015via ghsa
1 file changed · +14 5
  • salt/modules/serverdensity_device.py+14 5 modified
    @@ -8,6 +8,8 @@
     import requests
     import json
     import logging
    +import os
    +import tempfile
     
     from salt.exceptions import CommandExecutionError
     
    @@ -216,17 +218,24 @@ def install_agent(agent_key):
     
             salt '*' serverdensity_device.install_agent c2bbdd6689ff46282bdaa07555641498
         '''
    -    work_dir = '/tmp/'
    +    work_dir = os.path.join(__opts__['cachedir'], 'tmp')
    +    if not os.path.isdir(work_dir):
    +        os.mkdir(work_dir)
    +    install_file = tempfile.NamedTemporaryFile(dir=work_dir,
    +                                                   suffix='.sh',
    +                                                   delete=False)
    +    install_filename = install_file.name
    +    install_file.close()
         account_url = get_sd_auth('account_url')
     
         __salt__['cmd.run'](
    -        cmd='curl https://www.serverdensity.com/downloads/agent-install.sh -o install.sh',
    +        cmd='curl https://www.serverdensity.com/downloads/agent-install.sh -o {0}'.format(install_filename),
             cwd=work_dir
         )
    -    __salt__['cmd.run'](cmd='chmod +x install.sh', cwd=work_dir)
    +    __salt__['cmd.run'](cmd='chmod +x {0}'.format(install_filename), cwd=work_dir)
     
         return __salt__['cmd.run'](
    -        cmd='./install.sh -a {account_url} -k {agent_key}'.format(
    -            account_url=account_url, agent_key=agent_key),
    +        cmd='./{filename} -a {account_url} -k {agent_key}'.format(
    +            filename=install_filename, account_url=account_url, agent_key=agent_key),
             cwd=work_dir
         )
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.