CVE-2020-1735
Ansible Tower vulnerability analysis and mitigation

Overview

A flaw was discovered in the Ansible Engine's fetch module (CVE-2020-1735). The vulnerability allows an attacker to intercept the module, inject a new path, and choose a new destination path on the controller node. This vulnerability affects all versions in Ansible Engine 2.7.x, 2.8.x, and 2.9.x branches, as well as Ansible Tower versions up to 3.4.5, 3.5.5, and 3.6.3 (Red Hat Bug).

Technical details

The vulnerability exists in the fetch module's handling of source paths. When the fetch module takes the source result from the slurp module, which comes from the remote host, the path validation is insufficient. This allows manipulation of the path to potentially traverse directories, such as creating paths like '/tmp/result_fetch/ansible1/../../../../../../../../../../../../../../../../home//.profile'. The vulnerability has a CVSS v3.1 base score of 4.6 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N (NVD).

Impact

The vulnerability allows an attacker to place files with controlled contents in arbitrary locations on the controller node through path manipulation. This could potentially lead to security compromises depending on the location where files are placed and their contents (GitHub Issue).

Mitigation and workarounds

The vulnerability was fixed in Ansible Engine versions 2.7.17, 2.8.11, and 2.9.7. Users are advised to upgrade to these or later versions. Prior to patching, there was no known workaround except avoiding the use of the affected fetch module (Red Hat Bug).

Community reactions

Multiple Linux distributions responded to this vulnerability by releasing security updates, including Fedora, Debian, and Gentoo. Red Hat rated this update as having an 'Important' security impact (Fedora Update, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related Ansible Tower vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-4112HIGH8.8
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesAug 25, 2022
CVE-2021-3583HIGH7.1
  • Ansible TowerAnsible Tower
  • ansible-doc
NoYesSep 22, 2021
CVE-2020-14327MEDIUM5.5
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021
CVE-2020-14329LOW3.3
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021
CVE-2020-14328LOW3.3
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management