Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3701

Опубликовано: 23 авг. 2022
Источник: debian
EPSS Низкий

Описание

A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ansible-runnerfixed2.1.1-1package

Примечания

  • https://github.com/ansible/ansible-runner/issues/738

  • https://github.com/ansible/ansible-runner/pull/742/commits/60b059f00409224acae1e417153a241c8591ad89

EPSS

Процентиль: 33%
0.00133
Низкий

Связанные уязвимости

CVSS3: 6.6
ubuntu
больше 3 лет назад

A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6.6
redhat
больше 4 лет назад

A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6.6
nvd
больше 3 лет назад

A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6.6
github
больше 3 лет назад

ansible-runner has default temporary files written to world R/W locations

EPSS

Процентиль: 33%
0.00133
Низкий