CVE-2020-25635
Confidentiality vulnerability in ansible (PyPI)

Confidentiality No known exploit

What is CVE-2020-25635 About?

This vulnerability in Ansible Base's aws_ssm connection plugin leads to sensitive data exposure. Files containing playbook run data are not properly garbage collected and remain in an S3 bucket. Exploitation is relatively easy as it stems from a design flaw in cleanup processes.

Affected Software

N/A

Technical Details

The Ansible Base aws_ssm connection plugin fails to properly clean up temporary files after a playbook execution. Specifically, data generated during the playbook run, which is temporarily stored in an S3 bucket configured for the aws_ssm plugin, is not removed upon job completion. This oversight means that sensitive information processed or utilized by the playbook persists in the S3 bucket, making it accessible to anyone with sufficient permissions or compromised credentials for that S3 bucket. The attack vector involves discovering or having prior access to these S3 buckets and retrieving the lingering files.

What is the Impact of CVE-2020-25635?

Successful exploitation may allow attackers to access sensitive data, configuration details, or operational secrets handled by Ansible playbooks, leading to unauthorized information disclosure and potential further compromise of interconnected systems.

What is the Exploitability of CVE-2020-25635?

Exploitation of this vulnerability is of medium complexity, primarily requiring access to the S3 bucket where the temporary files are stored. No direct authentication to the Ansible system itself is needed beyond access to the S3 resource. The attack is remote, contingent on the attacker's ability to enumerate or gain access to the S3 bucket. There are no specific user-privilege requirements on the Ansible control plane; rather, the vulnerability relies on the S3 bucket's access controls. The primary risk factor is misconfigured or overly permissive S3 bucket policies, or the compromise of credentials that grant read access to the bucket.

What are the Known Public Exploits?

PoC Author Link Commentary
No known exploits

What are the Available Fixes for CVE-2020-25635?

Available Upgrade Options

  • No fixes available

Struggling with dependency upgrades?

See how Resolved Security's drop-in replacements make it simple.

Book a demo

Additional Resources

What are Similar Vulnerabilities to CVE-2020-25635?

Similar Vulnerabilities: CVE-2021-36287 , CVE-2022-23577 , CVE-2021-3480 , CVE-2020-14144 , CVE-2020-1967