Vulnerability identifier: #VU27558
Vulnerability risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Red Hat Ansible Engine
Universal components / Libraries /
Software for developers
Vendor: Red Hat Inc.
Description
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists when extracting a collection .tar.gz file, the directory is created without sanitizing the filename when running ansible-galaxy collection install. A remote user can send a specially crafted HTTP request and overwrite any file within the system.
This vulnerability affects versions 2.9.x prior to 2.9.7.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Red Hat Ansible Engine: 2.9.0 - 2.9.6
External links
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691
https://github.com/ansible/ansible/pull/68596
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.