[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-1733Date: (C)2020-03-12   (M)2024-01-04


A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p

"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc//cmdline'.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.0CVSS Score : 3.7
Exploit Score: 0.8Exploit Score: 1.9
Impact Score: 3.7Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: HIGH
Privileges Required: LOWAuthentication: NONE
User Interaction: REQUIREDConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: PARTIAL
Integrity: LOW 
Availability: LOW 
  
Reference:
DSA-4950
FEDORA-2020-1b6ce91e37
FEDORA-2020-3990f03ba3
FEDORA-2020-f80154b5b4
GLSA-202006-11
https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733
https://github.com/ansible/ansible/issues/67791

CPE    1
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-362
OVAL    3
oval:org.secpod.oval:def:74573
oval:org.secpod.oval:def:605594
oval:org.secpod.oval:def:1701763

© SecPod Technologies