Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-1737

Опубликовано: 09 мар. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ansiblefixed2.9.7+dfsg-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1802154

  • https://github.com/ansible/ansible/issues/67795

  • https://github.com/ansible/ansible/pull/67799

  • Issue in the win_unzip module which is executed only on Windows plattform

EPSS

Процентиль: 31%
0.00119
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

CVSS3: 7.5
redhat
почти 6 лет назад

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

CVSS3: 7.5
nvd
почти 6 лет назад

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

CVSS3: 7.8
github
почти 5 лет назад

Path Traversal in Ansible

CVSS3: 7.5
fstec
почти 6 лет назад

Уязвимость модуля win_unzip системы управления конфигурациями Ansible, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 31%
0.00119
Низкий