A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2202-1 | ansible security update |
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2020-0005 | A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes \"ansible-vault edit\", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. |
Github GHSA |
GHSA-vcg8-98q8-g7mj | Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.903Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2020-1740
No data.
Status : Modified
Published: 2020-03-16T16:15:14.217
Modified: 2024-11-21T05:11:17.097
Link: CVE-2020-1740
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA