CVE-2020-1945
Publication date 14 May 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
From the Ubuntu Security Team
It was discovered that Apache Ant created temporary files with insecure permissions. An attacker could use this vulnerability to read sensitive information leaked into /tmp, or potentially inject malicious code into a project that is built with Apache Ant.
Mitigation
Set the java.io.tmpdir property of the JVM to point to a directory that is not world read/writable.
Status
Package | Ubuntu Release | Status |
---|---|---|
ant | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Fixed 1.10.7-1ubuntu0.1~esm1
|
|
18.04 LTS bionic |
Fixed 1.10.5-3~18.04.1~esm1
|
|
16.04 LTS xenial |
Fixed 1.9.6-1ubuntu1.1+esm1
|
|
14.04 LTS trusty |
Fixed 1.9.3-2ubuntu0.1+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
msalvatore
There are two potential mitigations for this vulnerability. 1) Set your umask to 077. 2) Set your JVM's java.io.tmpdir system property to a directory only readable and writable by the current user running Ant. The fix for this CVE is incomplete. CVE-2020-11979 finishes resolving the issue.
Patch details
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.3 · Medium |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4380-1
- Apache Ant vulnerability
- 1 June 2020
- USN-4874-1
- Apache Ant vulnerability
- 15 March 2021