CVE-2020-1733
Ansible Tower vulnerability analysis and mitigation

Overview

A race condition vulnerability (CVE-2020-1733) was discovered in Ansible Engine affecting versions 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior. The vulnerability was identified when running a playbook with an unprivileged become user (NVD, Red Hat).

Technical details

The vulnerability occurs when Ansible needs to run a module with become user, where the temporary directory is created in /var/tmp. The directory is created using the command 'umask 77 && mkdir -p', but this operation does not fail if the directory already exists and is owned by another user. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.0 (Medium) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L (NVD).

Impact

An attacker could potentially gain control of the become user as the target directory can be retrieved by iterating '/proc/pid/cmdline'. This could lead to privilege escalation and unauthorized access to system resources (NVD, GitHub Issue).

Mitigation and workarounds

The vulnerability has been fixed in Ansible Engine versions 2.7.17, 2.8.11, and 2.9.7. As a workaround, the proc filesystem can be mounted with hidepid=2 option to limit access to process information. This way only the user used by Ansible will be able to perform the attack as users on the system will be able to access only their processes /proc/$PID/ directories (Red Hat).

Community reactions

Multiple Linux distributions have released security advisories and patches for this vulnerability, including Debian, Fedora, and Gentoo. The vulnerability was addressed promptly by the Ansible community and vendors (Debian LTS, Gentoo).

Additional resources


SourceThis report was generated using AI

Related Ansible Tower vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-4112HIGH8.8
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesAug 25, 2022
CVE-2021-3583HIGH7.1
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesSep 22, 2021
CVE-2020-14327MEDIUM5.5
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021
CVE-2020-14329LOW3.3
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021
CVE-2020-14328LOW3.3
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management