CVE-2020-25635
Description
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ansible aws_ssm connection plugin fails to delete transferred files from S3 after playbook completion, risking data exposure.
A flaw in the Ansible aws_ssm connection plugin prevents garbage collection of files transferred to S3 buckets during playbook execution [1][3]. Files remain in the bucket even after the playbook run is completed, directly affecting data confidentiality [1]. The issue stems from missing cleanup logic that should remove transferred files or use properly namespaced folders to prevent data leakage [3].
The aws_ssm connection plugin is used to transfer files to AWS instances via SSM, storing them temporarily in an S3 bucket. The attack surface is limited to users who have access to the S3 bucket used for file transfers. An attacker could gain access to those leftover files if the bucket permissions are misconfigured or if the bucket's lifecycle policies do not automatically purge stale objects. No authentication to the Ansible control node is required; the risk is primarily to the confidentiality of data stored in the shared S3 bucket [1].
A successful attacker could read sensitive data that was transferred during playbook runs, such as configuration files, scripts, or credentials, which could lead to further compromise of AWS resources or other systems managed by Ansible. The exposure directly impacts data confidentiality, as stated in the CVE description [1].
The vulnerability was fixed in the community.aws collection via pull request #237, which introduced per-host namespaced folders in the S3 bucket and ensures transferred files are deleted after use [3]. Users should update the community.aws collection to the patched version to remediate the issue. There is no indication that this CVE is listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ansiblePyPI | < 2.10.1 | 2.10.1 |
Affected products
2- AWS Community/Community Collectionsv5Range: from 1.0.0 to 1.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-f556-49jc-4rvcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-25635ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgighsax_refsource_CONFIRMWEB
- github.com/ansible-collections/community.aws/issues/222ghsax_refsource_MISCWEB
- github.com/ansible-collections/community.aws/pull/237ghsaWEB
- github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-220.yamlghsaWEB
News mentions
0No linked articles in our index yet.