Lucene search

K
cve[email protected]CVE-2020-1737
HistoryMar 09, 2020 - 4:15 p.m.

CVE-2020-1737

2020-03-0916:15:12
CWE-22
web.nvd.nist.gov
186
cve-2020-1737
ansible
extract-zip
win_unzip
security vulnerability
path traversal
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.3%

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

Affected configurations

Vulners
NVD
Node
redhatansibleRange2.7.17
OR
redhatansibleRange2.8.9
OR
redhatansibleRange2.9.6
OR
redhatansibleRange2.10
VendorProductVersionCPE
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
redhatansible*cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Ansible",
    "vendor": "Red Hat",
    "versions": [
      {
        "status": "affected",
        "version": "2.7.17 and prior"
      },
      {
        "status": "affected",
        "version": "2.8.9 and prior"
      },
      {
        "status": "affected",
        "version": "2.9.6 and prior"
      },
      {
        "status": "affected",
        "version": "fixed in 2.10"
      }
    ]
  }
]

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.3%