CVE-2021-3702
Python vulnerability analysis and mitigation

Overview

A race condition vulnerability was identified in ansible-runner, tracked as CVE-2021-3702. The vulnerability allows an attacker to watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and subsequently gain access to ansible-runner's private_data_dir when ansible-runner makes use of it again (CVE Mitre, Red Hat Bugzilla).

Technical details

The vulnerability stems from insecure handling of temporary directories in ansible-runner. The issue was discovered in the code that manages the creation and deletion of temporary directories, specifically affecting the private_data_dir functionality. The vulnerability was fixed through a patch that implemented secure temporary file handling using mkdtemp() (GitHub Commit).

Impact

The highest threat from this vulnerability is to integrity and confidentiality. An attacker who successfully exploits this vulnerability could gain unauthorized access to ansible-runner's private_data_dir, potentially exposing sensitive information (CVE Mitre).

Mitigation and workarounds

The vulnerability was fixed before ansible-runner 2.0 was published. The fix was implemented through a pull request that was back-ported to release_2.0 before it went GA. Notably, version 1.4 and earlier versions did not contain this vulnerable code, meaning no released version of runner was actually impacted (Red Hat Bugzilla).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22612HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22609HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22608HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22690LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management