Lucene search

K
githubGitHub Advisory DatabaseGHSA-772J-XVF9-QPF5
HistoryAug 24, 2022 - 12:00 a.m.

ansible-runner 2.0.0 vulnerable to Race Condition

2022-08-2400:00:29
CWE-362
CWE-377
GitHub Advisory Database
github.com
12
ansible
vulnerability
race condition
integrity
confidentiality
software

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

0.0005 Low

EPSS

Percentile

17.2%

A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner’s private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.

Affected configurations

Vulners
Node
ansibleansibleRange<2.1.0
CPENameOperatorVersion
ansible-runnerlt2.1.0

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

0.0005 Low

EPSS

Percentile

17.2%