Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vcg8-98q8-g7mj

Опубликовано: 07 апр. 2021
Источник: github
Github: Прошло ревью
CVSS4: 5.7
CVSS3: 4.7

Описание

Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

Пакеты

Наименование

ansible

pip
Затронутые версииВерсия исправления

< 2.7.17

2.7.17

Наименование

ansible

pip
Затронутые версииВерсия исправления

>= 2.8.0a1, < 2.8.11

2.8.11

Наименование

ansible

pip
Затронутые версииВерсия исправления

>= 2.9.0a1, < 2.9.7

2.9.7

EPSS

Процентиль: 8%
0.00029
Низкий

5.7 Medium

CVSS4

4.7 Medium

CVSS3

Дефекты

CWE-200
CWE-377

Связанные уязвимости

CVSS3: 3.9
ubuntu
почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
redhat
почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
nvd
почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
debian
почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editin ...

CVSS3: 4.7
fstec
почти 6 лет назад

Уязвимость метода write_data системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 8%
0.00029
Низкий

5.7 Medium

CVSS4

4.7 Medium

CVSS3

Дефекты

CWE-200
CWE-377