Lucene search

K
cve[email protected]CVE-2020-10685
HistoryMay 11, 2020 - 2:15 p.m.

CVE-2020-10685

2020-05-1114:15:11
CWE-459
web.nvd.nist.gov
145
4
cve-2020-10685
ansible
ansible engine
ansible tower
vulnerability
decryption
sensitive data
temporary directory

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.

Affected configurations

Vulners
NVD
Node
redhatansibleRange2.7.02.7.17
OR
redhatansibleRange2.8.02.8.11
OR
redhatansibleRange2.9.02.9.7
OR
redhatansibleRange3.4.5
OR
redhatansibleRange3.5.5
OR
redhatansibleRange3.6.3
VendorProductVersionCPE
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Red Hat",
    "product": "Ansible",
    "versions": [
      {
        "version": "ansible-engine versions 2.7.x before 2.7.17",
        "status": "affected"
      },
      {
        "version": "ansible-engine 2.8.x before 2.8.11",
        "status": "affected"
      },
      {
        "version": "ansible-engine 2.9.x before 2.9.7",
        "status": "affected"
      },
      {
        "version": "Ansible Tower <= 3.4.5 ",
        "status": "affected"
      },
      {
        "version": "Ansible Tower <= 3.5.5",
        "status": "affected"
      },
      {
        "version": "Ansible Tower <= 3.6.3",
        "status": "affected"
      }
    ]
  }
]

Social References

More

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%