First published: Mon Mar 16 2020(Updated: )
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | <=2.7.16 | |
Redhat Ansible | >=2.8.0<2.8.15 | |
Redhat Ansible | >=2.9.0<2.9.13 | |
Redhat Ansible Tower | <=3.3.4 | |
Redhat Ansible Tower | >=3.3.5<=3.4.5 | |
Redhat Ansible Tower | >=3.5.0<=3.5.5 | |
Redhat Ansible Tower | >=3.6.0<=3.6.3 | |
Redhat Ansible Tower | >=3.7.0<=3.7.2 | |
Redhat Cloudforms Management Engine | =5.0 | |
Redhat Openstack | =13 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
pip/ansible | >=2.7.0<=2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1736 is a vulnerability found in Ansible Engine that allows destination files to become world-readable.
The vulnerability occurs when a file is moved using the atomic_move primitive without specifying the file mode.
CVE-2020-1736 has a severity rating of low (3.3).
Versions 2.7.16 to 2.9.13 of Redhat Ansible, versions 3.3.4 to 3.7.2 of Redhat Ansible Tower, Redhat Cloudforms Management Engine 5.0, and Fedoraproject Fedora 31 and 32 are affected.
To fix the vulnerability, update Ansible Engine to a version that is not affected by the issue.