7.5
CWE
377 379 74 94
Advisory Published
Advisory Published
Updated

CVE-2020-11979: Code Injection

First published: Thu Oct 01 2020(Updated: )

As mitigation for <a href="https://access.redhat.com/security/cve/CVE-2020-1945">CVE-2020-1945</a> Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. References: <a href="https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E">https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E">https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E">https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E">https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E">https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E">https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/</a> <a href="https://security.gentoo.org/glsa/202011-18">https://security.gentoo.org/glsa/202011-18</a>

Credit: security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
redhat/jenkins<0:2.263.3.1612433584-1.el7
0:2.263.3.1612433584-1.el7
redhat/conmon<2:2.0.21-1.rhaos4.5.el7
2:2.0.21-1.rhaos4.5.el7
redhat/jenkins<0:2.263.3.1612434332-1.el7
0:2.263.3.1612434332-1.el7
redhat/machine-config-daemon<0:4.5.0-202102050524.p0.git.2594.ff3b8c0.el8
0:4.5.0-202102050524.p0.git.2594.ff3b8c0.el8
redhat/openshift<0:4.5.0-202102050524.p0.git.0.9229406.el7
0:4.5.0-202102050524.p0.git.0.9229406.el7
redhat/openshift-ansible<0:4.5.0-202102031005.p0.git.0.c6839a2.el7
0:4.5.0-202102031005.p0.git.0.c6839a2.el7
redhat/openshift-clients<0:4.5.0-202102051529.p0.git.3612.61b096a.el7
0:4.5.0-202102051529.p0.git.3612.61b096a.el7
redhat/runc<0:1.0.0-72.rhaos4.5.giteadfc6b.el8
0:1.0.0-72.rhaos4.5.giteadfc6b.el8
redhat/jenkins<0:2.263.3.1612434510-1.el8
0:2.263.3.1612434510-1.el8
Apache Ant=1.10.8
Gradle Gradle<6.8.0
Fedoraproject Fedora=31
Fedoraproject Fedora=32
Fedoraproject Fedora=33
Oracle Agile Engineering Data Management=6.2.1.0
Oracle API Gateway=11.1.2.4.0
Oracle Banking Platform=2.4.0
Oracle Banking Platform=2.4.1
Oracle Banking Platform=2.6.2
Oracle Banking Platform=2.7.0
Oracle Banking Platform=2.7.1
Oracle Banking Platform=2.8.0
Oracle Banking Treasury Management=14.4
Oracle Communications Unified Inventory Management=7.4.0
Oracle Communications Unified Inventory Management=7.4.1
Oracle Data Integrator=12.2.1.3.0
Oracle Data Integrator=12.2.1.4.0
Oracle Endeca Information Discovery Studio=3.2.0.0
Oracle Enterprise Repository=11.1.1.7.0
Oracle Financial Services Analytical Applications Infrastructure>=8.0.6<=8.0.9
Oracle Financial Services Analytical Applications Infrastructure=8.1.0
Oracle Financial Services Analytical Applications Infrastructure=8.1.1
Oracle FLEXCUBE Private Banking=12.0.0
Oracle FLEXCUBE Private Banking=12.1.0
Oracle Primavera Gateway>=16.2.0<=16.2.11
Oracle Primavera Gateway>=17.12.0<=17.12.9
Oracle Primavera Unifier>=17.7<=17.12
Oracle Primavera Unifier=16.1
Oracle Primavera Unifier=16.2
Oracle Primavera Unifier=18.8
Oracle Primavera Unifier=19.12
Oracle Primavera Unifier=20.12
Oracle Real-time Decision Server=3.2.0.0
Oracle Real-time Decision Server=11.1.1.9.0
Oracle Retail Advanced Inventory Planning=14.1
Oracle Retail Assortment Planning=16.0.3
Oracle Retail Category Management Planning \& Optimization=16.0.3
Oracle Retail Eftlink=19.0.1
Oracle Retail Eftlink=20.0.0
Oracle Retail Financial Integration=14.1.3
Oracle Retail Financial Integration=15.0.3
Oracle Retail Financial Integration=16.0.3
Oracle Retail Integration Bus=15.0.3
Oracle Retail Item Planning=16.0.3
Oracle Retail Macro Space Optimization=16.0.3
Oracle Retail Merchandise Financial Planning=16.0.3
Oracle Retail Merchandising System=14.1.3.2
Oracle Retail Merchandising System=16.0.3
Oracle Retail Predictive Application Server=14.1
Oracle Retail Regular Price Optimization=16.0.3
Oracle Retail Replenishment Optimization=16.0.3
Oracle Retail Service Backbone=14.1.3
Oracle Retail Service Backbone=15.0.3
Oracle Retail Service Backbone=16.0.3
Oracle Retail Size Profile Optimization=16.0.3
Oracle Retail Store Inventory Management=14.1.3.9
Oracle Retail Store Inventory Management=15.0.3.0
Oracle Retail Store Inventory Management=16.0.3.0
Oracle Retail Xstore Point of Service=15.0.4
Oracle Retail Xstore Point of Service=16.0.6
Oracle Retail Xstore Point of Service=17.0.4
Oracle Retail Xstore Point of Service=18.0.3
Oracle Retail Xstore Point of Service=19.0.2
Oracle Storagetek Acsls=8.5.1
Oracle Storagetek Tape Analytics=2.4
Oracle TimesTen In-Memory Database<11.2.2.8.27
Oracle Utilities Framework=4.3.0.5.0
Oracle Utilities Framework=4.3.0.6.0
Oracle Utilities Framework=4.4.0.0.0
Oracle Utilities Framework=4.4.0.2.0
redhat/ant<1.10.9
1.10.9
maven/org.apache.ant:ant=1.10.8
1.10.9
=1.10.8
<6.8.0
=31
=32
=33
=6.2.1.0
=11.1.2.4.0
=2.4.0
=2.4.1
=2.6.2
=2.7.0
=2.7.1
=2.8.0
=14.4
=7.4.0
=7.4.1
=12.2.1.3.0
=12.2.1.4.0
=3.2.0.0
=11.1.1.7.0
>=8.0.6<=8.0.9
=8.1.0
=8.1.1
=12.0.0
=12.1.0
>=16.2.0<=16.2.11
>=17.12.0<=17.12.9
>=17.7<=17.12
=16.1
=16.2
=18.8
=19.12
=20.12
=3.2.0.0
=11.1.1.9.0
=14.1
=16.0.3
=16.0.3
=19.0.1
=20.0.0
=14.1.3
=15.0.3
=16.0.3
=15.0.3
=16.0.3
=16.0.3
=16.0.3
=14.1.3.2
=16.0.3
=14.1
=16.0.3
=16.0.3
=14.1.3
=15.0.3
=16.0.3
=16.0.3
=14.1.3.9
=15.0.3.0
=16.0.3.0
=15.0.4
=16.0.6
=17.0.4
=18.0.3
=19.0.2
=8.5.1
=2.4
<11.2.2.8.27
=4.3.0.5.0
=4.3.0.6.0
=4.4.0.0.0
=4.4.0.2.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203