Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13d2NoLWNtcXItaGhybc4AAuaC
ansible-runner 2.0.0 default temporary files written to world R/W locations
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.
Permalink: https://github.com/advisories/GHSA-wwch-cmqr-hhrmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13d2NoLWNtcXItaGhybc4AAuaC
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 6.6
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Identifiers: GHSA-wwch-cmqr-hhrm, CVE-2021-3701
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-3701
- https://github.com/ansible/ansible-runner/issues/738
- https://github.com/ansible/ansible-runner/pull/742/commits
- https://access.redhat.com/security/cve/CVE-2021-3701
- https://bugzilla.redhat.com/show_bug.cgi?id=1977959
- https://github.com/ansible/ansible-runner/pull/742
- https://github.com/advisories/GHSA-wwch-cmqr-hhrm
Blast Radius: 18.9
Affected Packages
pypi:ansible-runner
Dependent packages: 26Dependent repositories: 719
Downloads: 315,669 last month
Affected Version Ranges: >= 2.0.0, < 2.1.0
Fixed in: 2.1.0
All affected versions: 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4
All unaffected versions: 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.1.0, 1.1.1, 1.1.2, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.0, 1.4.1, 1.4.2, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.4.8, 1.4.9, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.6