#VU27558 Path traversal in Red Hat Ansible Engine


Published: 2020-05-06 | Updated: 2020-07-07

Vulnerability identifier: #VU27558

Vulnerability risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-10691

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Red Hat Ansible Engine
Universal components / Libraries / Software for developers

Vendor: Red Hat Inc.

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists when extracting a collection .tar.gz file, the directory is created without sanitizing the filename when running ansible-galaxy collection install. A remote user can send a specially crafted HTTP request and overwrite any file within the system.

This vulnerability affects versions 2.9.x prior to 2.9.7.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Red Hat Ansible Engine: 2.9.0 - 2.9.6


External links
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691
http://github.com/ansible/ansible/pull/68596


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability