Name | CVE-2020-1735 |
Description | A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
NVD severity | low |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ansible (PTS) | stretch | 2.2.1.0-2+deb9u1 | vulnerable |
stretch (security) | 2.2.1.0-2+deb9u2 | vulnerable | |
buster | 2.7.7+dfsg-1 | vulnerable | |
bullseye | 2.9.16+dfsg-1.1 | fixed | |
sid | 2.10.7-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ansible | source | jessie | (not affected) | |||
ansible | source | (unstable) | 2.9.7+dfsg-1 |
[buster] - ansible <no-dsa> (Minor issue)
[jessie] - ansible <not-affected> (No remote expansion in fetch module)
https://bugzilla.redhat.com/show_bug.cgi?id=1802085
https://github.com/ansible/ansible/issues/67793
https://github.com/ansible/ansible/pull/68720
Introduced in https://github.com/ansible/ansible/commit/e47f6137e5b897dec4319e7cb7791fb9b2cffb8d (1.8)
Fixed by: https://github.com/ansible/ansible/commit/290bfa820d533dc224e0c3fa7dd7c6b907ed0189
The commit has incorrect CVE reference adressed in
https://github.com/ansible/ansible/commit/18f91bbb88a84b1d3614ef41c3550da735592ac1