Vulnerability Details : CVE-2020-25636
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
Products affected by CVE-2020-25636
- cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-25636
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-25636
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:P |
3.9
|
4.9
|
NIST | |
6.6
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H |
1.3
|
5.2
|
Red Hat, Inc. | |
7.1
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
1.8
|
5.2
|
NIST |
CWE ids for CVE-2020-25636
-
Creating and using insecure temporary files can leave application and system data vulnerable to attack.Assigned by: secalert@redhat.com (Secondary)
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2020-25636
-
https://github.com/ansible-collections/community.aws/issues/221
aws_ssm connection plugin should namespace its file transfers · Issue #221 · ansible-collections/community.aws · GitHubThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636
1880274 – (CVE-2020-25636) CVE-2020-25636 Collections: aws_ssm connection plugin should namespace its file transfersIssue Tracking;Vendor Advisory
Jump to