SB2020031722 - Path traversal in ansible (Alpine package)
Published: March 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2020-1737)
The vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the "Extract-Zip" function from the "win_unzip" module. A local user can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=ec2f3b6aa9db9937f43c70b5c3caa8fbf7132575
- https://git.alpinelinux.org/aports/commit/?id=d4da1926ae91c64e47306a32a4627148900ff3c8
- https://git.alpinelinux.org/aports/commit/?id=457913175597d4cf53123064b576a5527a9aa0de
- https://git.alpinelinux.org/aports/commit/?id=899a908f75043f9a408b168005ecc557d060f15e
- https://git.alpinelinux.org/aports/commit/?id=609712eebaae8fa38739e422702af34deca6e4d0