[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-1740Date: (C)2020-03-17   (M)2024-01-04


A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 4.7CVSS Score : 1.9
Exploit Score: 1.0Exploit Score: 3.4
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
DSA-4950
FEDORA-2020-1b6ce91e37
FEDORA-2020-3990f03ba3
FEDORA-2020-f80154b5b4
GLSA-202006-11
https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740
https://github.com/ansible/ansible/issues/67798

CPE    1
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-377
OVAL    3
oval:org.secpod.oval:def:74573
oval:org.secpod.oval:def:605594
oval:org.secpod.oval:def:1701763

© SecPod Technologies