Insecure Temporary Directory Vulnerability in Ansible Engine and Tower
CVE-2020-10744
5MEDIUM
Summary
The vulnerability arises from an incomplete fix addressing the underlying flaw related to insecure temporary directory handling when executing commands under a different user using Ansible's 'become' directive. The failure to adequately secure these directories creates a race condition, particularly on systems utilizing Access Control Lists (ACLs) and Filesystems in Userspace (FUSE). This oversight affects various versions of both Ansible Engine and Ansible Tower, leaving systems potentially exposed to unauthorized access and exploitation.
Affected Version(s)
ansible ansible-engine 2.7.18 and prior
ansible ansible-engine 2.8.12 and prior
ansible ansible-engine 2.9.9 and prior
References
CVSS V3.1
Score:
5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved