Логотип exploitDog
bind:CVE-2020-1740
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1740

Количество 7

Количество 7

ubuntu логотип

CVE-2020-1740

почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
EPSS: Низкий
redhat логотип

CVE-2020-1740

почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
EPSS: Низкий
nvd логотип

CVE-2020-1740

почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
EPSS: Низкий
debian логотип

CVE-2020-1740

почти 6 лет назад

A flaw was found in Ansible Engine when using Ansible Vault for editin ...

CVSS3: 3.9
EPSS: Низкий
github логотип

GHSA-vcg8-98q8-g7mj

почти 5 лет назад

Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2022-00285

почти 6 лет назад

Уязвимость метода write_data системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0081-1

почти 4 года назад

Security update for ansible

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-1740

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-1740

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-1740

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

CVSS3: 3.9
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-1740

A flaw was found in Ansible Engine when using Ansible Vault for editin ...

CVSS3: 3.9
0%
Низкий
почти 6 лет назад
github логотип
GHSA-vcg8-98q8-g7mj

Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible

CVSS3: 4.7
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2022-00285

Уязвимость метода write_data системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 4.7
0%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0081-1

Security update for ansible

почти 4 года назад

Уязвимостей на страницу