SB2020022024 - Multiple vulnerabilities in Ansible



SB2020022024 - Multiple vulnerabilities in Ansible

Published: February 20, 2020 Updated: July 17, 2020

Security Bulletin ID SB2020022024
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2014-4658)

The vulnerability allows a local authenticated user to gain access to sensitive information.

The vault subsystem in Ansible before 1.5.5 does not set the umask before creation or modification of a vault file, which allows local users to obtain sensitive key information by reading a file.


2) Insufficiently protected credentials (CVE-ID: CVE-2014-4659)

The vulnerability allows a local authenticated user to gain access to sensitive information.

Ansible before 1.5.5 sets 0644 permissions for sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by reading a file that uses the "deb http://user:pass@server:port/" format.


3) Insufficiently protected credentials (CVE-ID: CVE-2014-4660)

The vulnerability allows a local authenticated user to gain access to sensitive information.

Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the "deb http://user:pass@server:port/" format.


Remediation

Install update from vendor's website.