Lucene search

K
githubGitHub Advisory DatabaseGHSA-772J-XVF9-QPF5
HistoryAug 24, 2022 - 12:00 a.m.

ansible-runner 2.0.0 vulnerable to Race Condition

2022-08-2400:00:29
CWE-362
CWE-377
GitHub Advisory Database
github.com
17
ansible
vulnerability
race condition
integrity
confidentiality
software

CVSS3

6.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

17.2%

A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner’s private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.

Affected configurations

Vulners
Node
redhatansible_runnerRange2.0.02.1.0
VendorProductVersionCPE
redhatansible_runner*cpe:2.3:a:redhat:ansible_runner:*:*:*:*:*:*:*:*

CVSS3

6.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

17.2%