Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1737

Опубликовано: 18 фев. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

A flaw was found in the Ansible Engine when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal.

Отчет

Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected. Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected. In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.

Меры по смягчению последствий

Currently, there is no mitigation for this issue except avoid using the affected win_unzip module when possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5ansible-towerNot affected
Red Hat Ceph Storage 2ansibleOut of support scope
Red Hat Ceph Storage 3ansibleAffected
Red Hat OpenStack Platform 10 (Newton)ansibleOut of support scope
Red Hat OpenStack Platform 13 (Queens)ansibleWill not fix
Red Hat Storage 3ansibleWill not fix
Red Hat Ansible Engine 2.7 for RHEL 7ansibleFixedRHSA-2020:154422.04.2020
Red Hat Ansible Engine 2.8 for RHEL 7ansibleFixedRHSA-2020:154322.04.2020
Red Hat Ansible Engine 2.8 for RHEL 8ansibleFixedRHSA-2020:154322.04.2020
Red Hat Ansible Engine 2.9 for RHEL 7ansibleFixedRHSA-2020:154122.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1802154ansible: Extract-Zip function in win_unzip module does not check extracted path

EPSS

Процентиль: 31%
0.00119
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

CVSS3: 7.5
nvd
почти 6 лет назад

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

CVSS3: 7.5
debian
почти 6 лет назад

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9 ...

CVSS3: 7.8
github
почти 5 лет назад

Path Traversal in Ansible

CVSS3: 7.5
fstec
почти 6 лет назад

Уязвимость модуля win_unzip системы управления конфигурациями Ansible, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 31%
0.00119
Низкий

7.5 High

CVSS3