Vulnerability CVE-2020-10685


Published: 2020-05-11

Description:
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.

Type:

CWE-668

(Exposure of Resource to Wrong Sphere)

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.9/10
2.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Redhat -> Ansible engine 
Redhat -> Ansible tower 
Redhat -> Ceph storage 
Redhat -> Openstack 
Redhat -> Storage 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685
https://github.com/ansible/ansible/pull/68433

Copyright 2024, cxsecurity.com

 

Back to Top