Description
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0030 | A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. |
Github GHSA |
GHSA-x7jh-595q-wq82 | Incorrect Permission Assignment for Critical Resource in Ansible |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.890Z
Reserved: 2019-11-27T00:00:00.000Z
Link: CVE-2020-1736
No data.
Status : Modified
Published: 2020-03-16T16:15:13.983
Modified: 2024-11-21T05:11:16.493
Link: CVE-2020-1736
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA