First published: Wed Feb 12 2020(Updated: )
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <0:2.7.17-1.el7ae | 0:2.7.17-1.el7ae |
redhat/ansible | <0:2.8.11-1.el7ae | 0:2.8.11-1.el7ae |
redhat/ansible | <0:2.8.11-1.el8ae | 0:2.8.11-1.el8ae |
redhat/ansible | <0:2.9.7-1.el7ae | 0:2.9.7-1.el7ae |
redhat/ansible | <0:2.9.7-1.el8ae | 0:2.9.7-1.el8ae |
Redhat Ansible | <2.7.17 | |
Redhat Ansible | >=2.8.0<2.8.11 | |
Redhat Ansible | >=2.9.0<2.9.7 | |
Redhat Ansible Tower | <=3.3.4 | |
Redhat Ansible Tower | >=3.3.5<=3.4.5 | |
Redhat Ansible Tower | >=3.5.0<=3.5.5 | |
Redhat Ansible Tower | >=3.6.0<=3.6.3 | |
Redhat Cloudforms Management Engine | =5.0 | |
Redhat Openstack | =13 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
debian/ansible | 2.7.7+dfsg-1+deb10u1 2.7.7+dfsg-1+deb10u2 2.10.7+merged+base+2.10.8+dfsg-1 7.3.0+dfsg-1 7.7.0+dfsg-3 | |
redhat/ansible-engine | <2.7.17 | 2.7.17 |
redhat/ansible-engine | <2.8.11 | 2.8.11 |
redhat/ansible-engine | <2.9.7 | 2.9.7 |
pip/ansible | >=2.9.0a1<2.9.7 | 2.9.7 |
pip/ansible | >=2.8.0a1<2.8.11 | 2.8.11 |
pip/ansible | <2.7.17 | 2.7.17 |
Currently, there is no mitigation for this issue except avoid using the 'edit' option from 'ansible-vault' command line tool.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-1740 is a vulnerability found in Ansible Engine when using Ansible Vault for editing encrypted files.
The severity of CVE-2020-1740 is low, with a severity value of 3.9.
Ansible versions 2.7.17-1.el7ae, 2.8.11-1.el7ae, 2.8.11-1.el8ae, 2.9.7-1.el7ae, and 2.9.7-1.el8ae are affected by CVE-2020-1740.
An attacker can exploit CVE-2020-1740 by executing "ansible-vault edit" on a system where another user can read the old and new secret.
Yes, you can find references for CVE-2020-1740 at the following links: [1] [2] [3].