Описание
Exposure of Sensitive Information to an Unauthorized Actor in Ansible
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-1739
- https://github.com/ansible/ansible/issues/67797
- https://github.com/ansible/ansible/pull/68911
- https://github.com/ansible/ansible/pull/68912
- https://github.com/ansible/ansible/pull/68913
- https://github.com/ansible/ansible/commit/1a89d4f059c21a818306a39ada7f5284ae125237
- https://github.com/ansible/ansible/commit/6c74a298702c8bb5532b9600073312e08f39680f
- https://github.com/ansible/ansible/commit/c6c4fbf4a1fdea1e10ba94462a60c413990a16a4
- https://www.debian.org/security/2021/dsa-4950
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3
- https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html
- https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-11.yaml
- https://github.com/advisories/GHSA-923p-fr2c-g5m2
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739
Пакеты
ansible
< 2.7.17
2.7.17
ansible
>= 2.8.0a1, < 2.8.11
2.8.11
ansible
>= 2.9.0a1, < 2.9.7
2.9.7
Связанные уязвимости
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9 ...
Уязвимость модуля svn системы управления конфигурациями Ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность