CVE-2020-1945

medium

Description

Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.

References

https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.groovy.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.fedoraproject.org/archives/list/[email protected]/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/

https://lists.fedoraproject.org/archives/list/[email protected]/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/

https://usn.ubuntu.com/4380-1/

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://www.oracle.com/security-alerts/cpujul2020.html

https://lists.apache.org/thread.html/[email protected]%3Ctorque-dev.db.apache.org%3E

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html

https://security.gentoo.org/glsa/202007-34

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.myfaces.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.ant.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cannounce.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cuser.ant.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

http://www.openwall.com/lists/oss-security/2020/09/30/6

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://www.oracle.com/security-alerts/cpuoct2020.html

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.groovy.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.groovy.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.groovy.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.groovy.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cusers.groovy.apache.org%3E

http://www.openwall.com/lists/oss-security/2020/12/06/1

https://lists.apache.org/thread.html/[email protected]%3Cannounce.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.groovy.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.myfaces.apache.org%3E

https://www.oracle.com/security-alerts/cpujan2021.html

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://www.oracle.com/security-alerts/cpuApr2021.html

https://lists.apache.org/thread.html/[email protected]%3Cdev.creadur.apache.org%3E

https://www.oracle.com//security-alerts/cpujul2021.html

https://www.oracle.com/security-alerts/cpuoct2021.html

https://www.oracle.com/security-alerts/cpujan2022.html

Details

Source: MITRE

Published: 2020-05-14

Updated: 2022-04-04

Type: CWE-668

Risk Information

CVSS v2

Base Score: 3.3

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 3.4

Severity: LOW

CVSS v3

Base Score: 6.3

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Impact Score: 5.2

Exploitability Score: 1

Severity: MEDIUM