A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/ansible/ansible/issues/67791 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/ - | |
References | () https://security.gentoo.org/glsa/202006-11 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4950 - Third Party Advisory |
25 Apr 2022, 17:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 |
01 Apr 2022, 20:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-377 | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References |
|
|
References | (GENTOO) https://security.gentoo.org/glsa/202006-11 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/ - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/ - Mailing List, Third Party Advisory |
07 Aug 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* |
Information
Published : 2020-03-11 19:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1733
Mitre link : CVE-2020-1733
CVE.ORG link : CVE-2020-1733
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- cloudforms_management_engine
- ansible_tower
- ansible
- openstack
debian
- debian_linux