CVE-2020-1736:
Incorrect Permission Assignment for Critical Resource in Ansible
3.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.10471%
CWE
Published
2/9/2022
Updated
11/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ansible | pip | >= 2.7.0, <= 2.10.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from atomic_move's file creation logic in basic.py. The code explicitly uses DEFAULT_PERM (0o0666) masked by the umask when creating new files, which could leave files world-readable depending on the environment's umask configuration. The GitHub issue (#67794) directly references this code path, and the CVE description matches this behavior. The lack of a mechanism to specify custom file modes in atomic_move operations is the root cause.