var-202004-0071
Vulnerability from variot
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system. ansible-engine Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. Ansible is a computer system configuration manager from Ansible, USA. This product can be used to publish, manage and orchestrate computer systems.
A path traversal vulnerability exists in Ansible. The vulnerability stems from the failure of network systems or products to properly filter resources or special elements in file paths. Attackers can use this vulnerability to access locations outside of the restricted directory. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Ansible security and bug fix update (2.9.7) Advisory ID: RHSA-2020:1542-01 Product: Red Hat Ansible Engine Advisory URL: https://access.redhat.com/errata/RHSA-2020:1542 Issue date: 2020-04-22 CVE Names: CVE-2020-1733 CVE-2020-1735 CVE-2020-1737 CVE-2020-1739 CVE-2020-1740 CVE-2020-1746 CVE-2020-1753 CVE-2020-10684 CVE-2020-10685 CVE-2020-10691 ==================================================================== 1. Summary:
An update for ansible is now available for Ansible Engine 2
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Ansible Engine 2 for RHEL 7 - noarch Red Hat Ansible Engine 2 for RHEL 8 - noarch
- Description:
Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
The following packages have been upgraded to a newer upstream version: ansible (2.9.7)
Bug Fix(es): * CVE-2020-10684 Ansible: code injection when using ansible_facts as a subkey * CVE-2020-10685 Ansible: modules which use files encrypted with vault are not properly cleaned up * CVE-2020-10691 Ansible: archive traversal vulnerability in ansible-galaxy collection install * CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive * CVE-2020-1735 ansible: path injection on dest parameter in fetch module * CVE-2020-1737 ansible: Extract-Zip function in win_unzip module does not check extracted path * CVE-2020-1739 ansible: svn module leaks password when specified as a parameter * CVE-2020-1740 ansible: secrets readable after ansible-vault edit * CVE-2020-1746 ansible: Information disclosure issue in ldap_attr and ldap_entry modules * CVE-2020-1753 Ansible: kubectl connection plugin leaks sensitive information
See: https://github.com/ansible/ansible/blob/v2.9.7/changelogs/CHANGELOG-v2.9.rs t for details on bug fixes in this release.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1801735 - CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive 1802085 - CVE-2020-1735 ansible: path injection on dest parameter in fetch module 1802154 - CVE-2020-1737 ansible: Extract-Zip function in win_unzip module does not check extracted path 1802178 - CVE-2020-1739 ansible: svn module leaks password when specified as a parameter 1802193 - CVE-2020-1740 ansible: secrets readable after ansible-vault edit 1805491 - CVE-2020-1746 ansible: Information disclosure issue in ldap_attr and ldap_entry modules 1811008 - CVE-2020-1753 Ansible: kubectl connection plugin leaks sensitive information 1814627 - CVE-2020-10685 Ansible: modules which use files encrypted with vault are not properly cleaned up 1815519 - CVE-2020-10684 Ansible: code injection when using ansible_facts as a subkey 1817161 - CVE-2020-10691 Ansible: archive traversal vulnerability in ansible-galaxy collection install
- Package List:
Red Hat Ansible Engine 2 for RHEL 7:
Source: ansible-2.9.7-1.el7ae.src.rpm
noarch: ansible-2.9.7-1.el7ae.noarch.rpm ansible-test-2.9.7-1.el7ae.noarch.rpm
Red Hat Ansible Engine 2 for RHEL 8:
Source: ansible-2.9.7-1.el8ae.src.rpm
noarch: ansible-2.9.7-1.el8ae.noarch.rpm ansible-test-2.9.7-1.el8ae.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-1733 https://access.redhat.com/security/cve/CVE-2020-1735 https://access.redhat.com/security/cve/CVE-2020-1737 https://access.redhat.com/security/cve/CVE-2020-1739 https://access.redhat.com/security/cve/CVE-2020-1740 https://access.redhat.com/security/cve/CVE-2020-1746 https://access.redhat.com/security/cve/CVE-2020-1753 https://access.redhat.com/security/cve/CVE-2020-10684 https://access.redhat.com/security/cve/CVE-2020-10685 https://access.redhat.com/security/cve/CVE-2020-10691 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXqBQdtzjgjWX9erEAQiAzA/+Ixc2vA1/QNQdZwcbTAoWl10xBXG2S5LL +KLCOTfHMB5e8BgGGiOnDEymEZ5SpLICs7NbHNJpZwPxEJ0SplJaVN9fy7Kg6Y4p KjWhrfaaGJL2f7tjlGSBcKhwWC5R9YQEZPSzzV4lvP4oVNT0liQLyGeDHieAG3jg mVcIaQp2yI8d3TPU35RK8XoDhOI/HqCBSrD+1V3G29PbuBkO/of6oyC/oJy5yzZr PypCWbvBiTkku2NYqqxYq94gCZypG+44+z4kYqKWSbBVEdkPJoLIA3/QDS8LE60A QnzSSV1PjKOv8AjDv4q9eH3nii3d2tfmyfr1UNVHCNCc8pEvKlx9ojb/TNB5RdYl wYcNAiUAQDRYOGmlnsPnfh/i+HGm+XccnLdlq9Kd0/HrpRaHVrgnQ4q8FCn8t2Vv JBjkrahA45gcxWRz1W4eoGGbkpnhtDc604yqT3TspqhRltHOoJjMahoZ0vi8ffv2 JjkR60dPtoWDii5Eb/wUN23DwlyCW1EsdsmZfHr355hKk5vsi+2CFMvQgW4tvG7v kCk3wvtckWXuGax543Vl1EBgBhEOt2FNlBpeG/Ge5HXvO8C77wqF1TIApK55hapI W2k5LGg1/s+iYCcpJt+fC7PatHhvmFzTkqfOZWcHnCJwVdTc9bE8yUXJ2sF9LpH/ ef20i0jkIrU=UR80 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0071", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ansible engine", "scope": "lt", "trust": 1.0, "vendor": "redhat", "version": "2.9.7" }, { "model": "ansible tower", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "ansible engine", "scope": "gte", "trust": 1.0, "vendor": "redhat", "version": "2.9.0" }, { "model": "ansible tower", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "ansible engine", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.9.7" }, { "model": "ansible", "scope": null, "trust": 0.6, "vendor": "ansible", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20686" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "NVD", "id": "CVE-2020-10691" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.9.7", "versionStartIncluding": "2.9.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:ansible_tower:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-10691" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "157354" }, { "db": "PACKETSTORM", "id": "157356" }, { "db": "CNNVD", "id": "CNNVD-202003-1677" } ], "trust": 0.8 }, "cve": "CVE-2020-10691", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-005055", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-20686", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-10691", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.0, "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.2, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-005055", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-10691", "trust": 1.0, "value": "MEDIUM" }, { "author": "secalert@redhat.com", "id": "CVE-2020-10691", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-005055", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-20686", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202003-1677", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-10691", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20686" }, { "db": "VULMON", "id": "CVE-2020-10691" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "NVD", "id": "CVE-2020-10691" }, { "db": "NVD", "id": "CVE-2020-10691" }, { "db": "CNNVD", "id": "CNNVD-202003-1677" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system. ansible-engine Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. Ansible is a computer system configuration manager from Ansible, USA. This product can be used to publish, manage and orchestrate computer systems. \n\r\n\r\nA path traversal vulnerability exists in Ansible. The vulnerability stems from the failure of network systems or products to properly filter resources or special elements in file paths. Attackers can use this vulnerability to access locations outside of the restricted directory. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Ansible security and bug fix update (2.9.7)\nAdvisory ID: RHSA-2020:1542-01\nProduct: Red Hat Ansible Engine\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:1542\nIssue date: 2020-04-22\nCVE Names: CVE-2020-1733 CVE-2020-1735 CVE-2020-1737\n CVE-2020-1739 CVE-2020-1740 CVE-2020-1746\n CVE-2020-1753 CVE-2020-10684 CVE-2020-10685\n CVE-2020-10691\n====================================================================\n1. Summary:\n\nAn update for ansible is now available for Ansible Engine 2\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Ansible Engine 2 for RHEL 7 - noarch\nRed Hat Ansible Engine 2 for RHEL 8 - noarch\n\n3. Description:\n\nAnsible is a simple model-driven configuration management, multi-node\ndeployment, and remote-task execution system. Ansible works over SSH and\ndoes not require any software or daemons to be installed on remote nodes. \nExtension modules can be written in any language and are transferred to\nmanaged machines automatically. \n\nThe following packages have been upgraded to a newer upstream version:\nansible (2.9.7)\n\nBug Fix(es):\n* CVE-2020-10684 Ansible: code injection when using ansible_facts as a\nsubkey\n* CVE-2020-10685 Ansible: modules which use files encrypted with vault are\nnot properly cleaned up\n* CVE-2020-10691 Ansible: archive traversal vulnerability in ansible-galaxy\ncollection install\n* CVE-2020-1733 ansible: insecure temporary directory when running\nbecome_user from become directive\n* CVE-2020-1735 ansible: path injection on dest parameter in fetch module\n* CVE-2020-1737 ansible: Extract-Zip function in win_unzip module does not\ncheck extracted path\n* CVE-2020-1739 ansible: svn module leaks password when specified as a\nparameter\n* CVE-2020-1740 ansible: secrets readable after ansible-vault edit\n* CVE-2020-1746 ansible: Information disclosure issue in ldap_attr and\nldap_entry modules\n* CVE-2020-1753 Ansible: kubectl connection plugin leaks sensitive\ninformation\n\nSee:\nhttps://github.com/ansible/ansible/blob/v2.9.7/changelogs/CHANGELOG-v2.9.rs\nt\nfor details on bug fixes in this release. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1801735 - CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive\n1802085 - CVE-2020-1735 ansible: path injection on dest parameter in fetch module\n1802154 - CVE-2020-1737 ansible: Extract-Zip function in win_unzip module does not check extracted path\n1802178 - CVE-2020-1739 ansible: svn module leaks password when specified as a parameter\n1802193 - CVE-2020-1740 ansible: secrets readable after ansible-vault edit\n1805491 - CVE-2020-1746 ansible: Information disclosure issue in ldap_attr and ldap_entry modules\n1811008 - CVE-2020-1753 Ansible: kubectl connection plugin leaks sensitive information\n1814627 - CVE-2020-10685 Ansible: modules which use files encrypted with vault are not properly cleaned up\n1815519 - CVE-2020-10684 Ansible: code injection when using ansible_facts as a subkey\n1817161 - CVE-2020-10691 Ansible: archive traversal vulnerability in ansible-galaxy collection install\n\n6. Package List:\n\nRed Hat Ansible Engine 2 for RHEL 7:\n\nSource:\nansible-2.9.7-1.el7ae.src.rpm\n\nnoarch:\nansible-2.9.7-1.el7ae.noarch.rpm\nansible-test-2.9.7-1.el7ae.noarch.rpm\n\nRed Hat Ansible Engine 2 for RHEL 8:\n\nSource:\nansible-2.9.7-1.el8ae.src.rpm\n\nnoarch:\nansible-2.9.7-1.el8ae.noarch.rpm\nansible-test-2.9.7-1.el8ae.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-1733\nhttps://access.redhat.com/security/cve/CVE-2020-1735\nhttps://access.redhat.com/security/cve/CVE-2020-1737\nhttps://access.redhat.com/security/cve/CVE-2020-1739\nhttps://access.redhat.com/security/cve/CVE-2020-1740\nhttps://access.redhat.com/security/cve/CVE-2020-1746\nhttps://access.redhat.com/security/cve/CVE-2020-1753\nhttps://access.redhat.com/security/cve/CVE-2020-10684\nhttps://access.redhat.com/security/cve/CVE-2020-10685\nhttps://access.redhat.com/security/cve/CVE-2020-10691\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nef20i0jkIrU=UR80\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-10691" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "CNVD", "id": "CNVD-2020-20686" }, { "db": "VULMON", "id": "CVE-2020-10691" }, { "db": "PACKETSTORM", "id": "157354" }, { "db": "PACKETSTORM", "id": "157356" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-10691", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2020-005055", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "157356", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-20686", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1407", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202003-1677", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-10691", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "157354", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20686" }, { "db": "VULMON", "id": "CVE-2020-10691" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "PACKETSTORM", "id": "157354" }, { "db": "PACKETSTORM", "id": "157356" }, { "db": "NVD", "id": "CVE-2020-10691" }, { "db": "CNNVD", "id": "CNNVD-202003-1677" } ] }, "id": "VAR-202004-0071", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20686" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20686" } ] }, "last_update_date": "2023-12-18T11:06:46.244000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ansible-galaxy - Fix tar path traversal issue during install - CVE-2020-10691 #68596", "trust": 0.8, "url": "https://github.com/ansible/ansible/pull/68596" }, { "title": "Bug 1817161", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2020-10691" }, { "title": "Red Hat: Important: Ansible security and bug fix update (2.9.7)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20201541 - security advisory" }, { "title": "Red Hat: Important: Ansible security and bug fix update (2.9.7)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20201542 - security advisory" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-10691" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "NVD", "id": "CVE-2020-10691" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2020-10691" }, { "trust": 1.7, "url": "https://github.com/ansible/ansible/pull/68596" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10691" }, { "trust": 1.4, "url": "https://access.redhat.com/security/cve/cve-2020-10691" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10691" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/ansible-core-write-access-via-galaxy-tar-extraction-32053" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1407/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/157356/red-hat-security-advisory-2020-1541-01.html" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2020:1541" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1753" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1740" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1746" }, { "trust": 0.2, "url": "https://github.com/ansible/ansible/blob/v2.9.7/changelogs/changelog-v2.9.rs" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1733" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1735" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1737" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10685" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10684" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1737" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10685" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1753" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1739" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1746" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1739" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1733" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1740" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10684" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1735" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:1542" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20686" }, { "db": "VULMON", "id": "CVE-2020-10691" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "PACKETSTORM", "id": "157354" }, { "db": "PACKETSTORM", "id": "157356" }, { "db": "NVD", "id": "CVE-2020-10691" }, { "db": "CNNVD", "id": "CNNVD-202003-1677" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20686" }, { "db": "VULMON", "id": "CVE-2020-10691" }, { "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "db": "PACKETSTORM", "id": "157354" }, { "db": "PACKETSTORM", "id": "157356" }, { "db": "NVD", "id": "CVE-2020-10691" }, { "db": "CNNVD", "id": "CNNVD-202003-1677" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-31T00:00:00", "db": "CNVD", "id": "CNVD-2020-20686" }, { "date": "2020-04-30T00:00:00", "db": "VULMON", "id": "CVE-2020-10691" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "date": "2020-04-22T15:11:55", "db": "PACKETSTORM", "id": "157354" }, { "date": "2020-04-22T15:12:11", "db": "PACKETSTORM", "id": "157356" }, { "date": "2020-04-30T17:15:11.957000", "db": "NVD", "id": "CVE-2020-10691" }, { "date": "2020-03-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1677" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-20686" }, { "date": "2020-05-21T00:00:00", "db": "VULMON", "id": "CVE-2020-10691" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005055" }, { "date": "2023-11-07T03:14:13.183000", "db": "NVD", "id": "CVE-2020-10691" }, { "date": "2020-05-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1677" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-1677" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ansible-engine Past Traversal Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005055" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-1677" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.