First published: Wed Feb 12 2020(Updated: )
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | <=2.7.16 | |
Redhat Ansible | >=2.8.0<=2.8.8 | |
Redhat Ansible | >=2.9.0<=2.9.5 | |
Redhat Ansible Tower | <=3.3.4 | |
Redhat Ansible Tower | >=3.4.0<=3.4.5 | |
Redhat Ansible Tower | >=3.5.0<=3.5.5 | |
Redhat Ansible Tower | >=3.6.0<=3.6.3 | |
Redhat Cloudforms Management Engine | =5.0 | |
Redhat Openstack | =13 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
debian/ansible | 2.7.7+dfsg-1+deb10u1 2.7.7+dfsg-1+deb10u2 2.10.7+merged+base+2.10.8+dfsg-1 7.3.0+dfsg-1 7.7.0+dfsg-3 | |
redhat/ansible-engine | <2.7.17 | 2.7.17 |
redhat/ansible-engine | <2.8.11 | 2.8.11 |
redhat/ansible-engine | <2.9.7 | 2.9.7 |
pip/ansible | >=2.9.0a1<2.9.7 | 2.9.7 |
pip/ansible | >=2.8.0a1<2.8.11 | 2.8.11 |
pip/ansible | >=0<2.7.17 | 2.7.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1739 is a vulnerability in Ansible that allows the disclosure of a password set with the argument "password" of the svn module, when it is used on the svn command line.
CVE-2020-1739 has a severity level of low with a CVSS score of 3.9.
CVE-2020-1739 affects Ansible versions 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior.
To fix CVE-2020-1739, update Ansible to version 2.7.17, 2.8.11, or 2.9.7.
You can find more information about CVE-2020-1739 on the Red Hat Bugzilla page: [link](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1805322)