cvelist/2020/1xxx/CVE-2020-1737.json

76 lines
2.4 KiB
JSON
Raw Normal View History

2019-11-27 17:00:59 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-1737",
2020-03-04 13:40:24 -03:00
"ASSIGNER": "gsuckevi@redhat.com"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "ansible",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737",
"refsource": "CONFIRM"
},
{
"url": "https://github.com/ansible/ansible/issues/67795",
"name": "https://github.com/ansible/ansible/issues/67795",
"refsource": "MISC"
}
]
2019-11-27 17:00:59 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-03-04 13:40:24 -03:00
"value": "A flaw was found in the Ansible Engine when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal."
2019-11-27 17:00:59 +00:00
}
]
2020-03-04 13:40:24 -03:00
},
"impact": {
"cvss": [
[
{
"vectorString": "7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
]
2019-11-27 17:00:59 +00:00
}
}