CVE-2020-1737
low-risk
Published 2020-03-09
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
Do I need to act?
-
0.12% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
LOCAL
/ HIGH complexity
Affected Products (2)
Affected Vendors
References (12)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737
Third Party Advisory
https://github.com/ansible/ansible/issues/67795
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737
Third Party Advisory
https://github.com/ansible/ansible/issues/67795
28
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
7/34 · Low