Rapid7 Vulnerability & Exploit Database

Debian: CVE-2020-1740: ansible -- security update

Back to Search

Debian: CVE-2020-1740: ansible -- security update

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
03/16/2020
Created
05/08/2020
Added
05/07/2020
Modified
08/20/2021

Description

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

Solution(s)

  • debian-upgrade-ansible

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;