Path traversal in Red Hat Ansible Engine



Published: 2020-05-06
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-10691
CWE-ID CWE-22
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Red Hat Ansible Engine
Universal components / Libraries / Software for developers

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Path traversal

EUVDB-ID: #VU27558

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-10691

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists when extracting a collection .tar.gz file, the directory is created without sanitizing the filename when running ansible-galaxy collection install. A remote user can send a specially crafted HTTP request and overwrite any file within the system.

This vulnerability affects versions 2.9.x prior to 2.9.7.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Red Hat Ansible Engine: 2.9.0 - 2.9.6

External links

http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691
http://github.com/ansible/ansible/pull/68596


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###