CVE Vulnerabilities

CVE-2020-25636

Insecure Temporary File

Published: Oct 05, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
6.6 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.

Weakness

Creating and using insecure temporary files can leave application and system data vulnerable to attack.

Affected Software

NameVendorStart VersionEnd Version
AnsibleRedhat2.10.1-rc2 (including)2.10.1-rc2 (including)
AnsibleUbuntubionic*
AnsibleUbuntufocal*
AnsibleUbuntugroovy*
AnsibleUbuntuhirsute*
AnsibleUbuntuimpish*
AnsibleUbuntukinetic*
AnsibleUbuntulunar*
AnsibleUbuntumantic*
AnsibleUbuntuoracular*
AnsibleUbuntuplucky*
AnsibleUbuntutrusty*
AnsibleUbuntutrusty/esm*
AnsibleUbuntuxenial*

References