• CVE-2020-1733

发布时间: 2021年9月23日

修改时间: 2021年9月23日

概要

A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 &amp;&amp; mkdir -p <dir&gt;"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid&gt;/cmdline'.

CVSS v3 指标

NVD openEuler
Confidentiality Low Low
Attack Vector Local Local
CVSS评分 5.0 5.0
Attack Complexity High High
Privileges Required Low Low
Scope Changed Changed
Integrity Low Low
User Interaction Required Required
Availability Low Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2021-1682 A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 &amp;&amp; mkdir -p <dir&gt;"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid&gt;/cmdline'. 2021年9月23日

影响产品

产品 状态
KY3.4-4A ansible Unaffected