#VU47274 Improper Verification of Cryptographic Signature in Ansible - CVE-2020-14365

 

#VU47274 Improper Verification of Cryptographic Signature in Ansible - CVE-2020-14365

Published: September 23, 2020 / Updated: October 2, 2020


Vulnerability identifier: #VU47274
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-14365
CWE-ID: CWE-347
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Ansible
Software vendor:
Red Hat Inc.

Description

The vulnerability allows a local authenticated user to #BASIC_IMPACT#.

A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.


Remediation

Install update from vendor's website.

External links