A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2202-1 ansible security update
Debian DSA Debian DSA DSA-4950-1 ansible security update
EUVD EUVD EUVD-2020-0027 A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with \"umask 77 && mkdir -p <dir>\"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
Github GHSA Github GHSA GHSA-g4mq-6fp5-qwcf Ansible vulnerable to Exposure of Resource to Wrong Sphere and Insecure Temporary File
Ubuntu USN Ubuntu USN USN-5315-1 Ansible vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T06:46:30.850Z

Reserved: 2019-11-27T00:00:00

Link: CVE-2020-1733

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-11T19:15:13.030

Modified: 2024-11-21T05:11:16.020

Link: CVE-2020-1733

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-02-18T00:00:00Z

Links: CVE-2020-1733 - Bugzilla

cve-icon OpenCVE Enrichment

No data.