Логотип exploitDog
bind:CVE-2020-1733
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1733

Количество 7

Количество 7

ubuntu логотип

CVE-2020-1733

почти 6 лет назад

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.

CVSS3: 5
EPSS: Низкий
redhat логотип

CVE-2020-1733

почти 6 лет назад

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2020-1733

почти 6 лет назад

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2020-1733

почти 6 лет назад

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2. ...

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-g4mq-6fp5-qwcf

почти 5 лет назад

Ansible vulnerable to Exposure of Resource to Wrong Sphere and Insecure Temporary File

CVSS3: 5
EPSS: Низкий
fstec логотип

BDU:2022-00282

почти 6 лет назад

Уязвимость системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0081-1

почти 4 года назад

Security update for ansible

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-1733

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.

CVSS3: 5
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-1733

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.

CVSS3: 5
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-1733

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.

CVSS3: 5
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2020-1733

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2. ...

CVSS3: 5
0%
Низкий
почти 6 лет назад
github логотип
GHSA-g4mq-6fp5-qwcf

Ansible vulnerable to Exposure of Resource to Wrong Sphere and Insecure Temporary File

CVSS3: 5
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2022-00282

Уязвимость системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
0%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0081-1

Security update for ansible

почти 4 года назад

Уязвимостей на страницу