4.7

CVE-2020-1740

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RedhatAnsible Version < 2.7.17
RedhatAnsible Version >= 2.8.0 < 2.8.11
RedhatAnsible Version >= 2.9.0 < 2.9.7
RedhatAnsible Tower Version <= 3.3.4
RedhatAnsible Tower Version >= 3.3.5 <= 3.4.5
RedhatAnsible Tower Version >= 3.5.0 <= 3.5.5
RedhatAnsible Tower Version >= 3.6.0 <= 3.6.3
RedhatOpenstack Version13
DebianDebian Linux Version8.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version30
FedoraprojectFedora Version31
FedoraprojectFedora Version32
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.086
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.7 1 3.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:P/I:N/A:N
secalert@redhat.com 3.9 0.8 2.7
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-377 Insecure Temporary File

Creating and using insecure temporary files can leave application and system data vulnerable to attack.