CVE-2015-1838: Salt improper handling of tmp files
5.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.38193%
CWE
-
Published
5/17/2022
Updated
10/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
salt | pip | < 2014.7.4 | 2014.7.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the install_agent function's original implementation which:
- Used hardcoded '/tmp' work directory (world-writable)
- Downloaded agent-install.sh to predictable path /tmp/install.sh
- Executed scripts directly from /tmp without secure tempfile practices
The fix in commit e11298d shows migration to cachedir + tempfile.NamedTemporaryFile with delete=False, confirming the original function's insecure temp file handling was the root cause.