CVE-2020-14365: Improper Verification of Cryptographic Signature in ansible
(updated )
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check
is set to False
, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
References
- bugzilla.redhat.com/show_bug.cgi?id=1869154
- github.com/advisories/GHSA-m429-fhmv-c6q2
- github.com/ansible/ansible
- github.com/ansible/ansible/commit/1d043e082b3b1f3ad35c803137f5d3bcbae92275
- github.com/ansible/ansible/commit/1fa2d5fd6b768120b76a77929e27302b06accc0c
- github.com/ansible/ansible/commit/9bea33ffa3be3d64827f59882d95b817cfab9b7e
- github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-209.yaml
- nvd.nist.gov/vuln/detail/CVE-2020-14365
- www.debian.org/security/2021/dsa-4950
Detect and mitigate CVE-2020-14365 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →