Description
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
Published: 2020-10-01
Score: 7.5 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-0549 Code injection in Apache Ant
Github GHSA Github GHSA GHSA-f62v-xpxf-3v68 Code injection in Apache Ant
References
Link Providers
https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm cve-icon cve-icon
https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-11979 cve-icon
https://security.gentoo.org/glsa/202011-18 cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-11979 cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

No history.

Subscriptions

Apache Ant
Fedoraproject Fedora
Gradle Gradle
Oracle Agile Engineering Data Management Api Gateway Banking Platform Banking Treasury Management Communications Unified Inventory Management Data Integrator Endeca Information Discovery Studio Enterprise Repository Financial Services Analytical Applications Infrastructure Flexcube Private Banking Primavera Gateway Primavera Unifier Real-time Decision Server Retail Advanced Inventory Planning Retail Assortment Planning Retail Category Management Planning \& Optimization Retail Eftlink Retail Financial Integration Retail Integration Bus Retail Item Planning Retail Macro Space Optimization Retail Merchandise Financial Planning Retail Merchandising System Retail Predictive Application Server Retail Regular Price Optimization Retail Replenishment Optimization Retail Service Backbone Retail Size Profile Optimization Retail Store Inventory Management Retail Xstore Point Of Service Storagetek Acsls Storagetek Tape Analytics Timesten In-memory Database Utilities Framework
Redhat Openshift
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T11:48:57.549Z

Reserved: 2020-04-21T00:00:00.000Z

Link: CVE-2020-11979

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-01T20:15:13.033

Modified: 2024-11-21T04:59:02.170

Link: CVE-2020-11979

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-10-01T00:00:00Z

Links: CVE-2020-11979 - Bugzilla

cve-icon OpenCVE Enrichment

No data.