A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.
2018-07-13T22:29:00.220
2024-11-21T03:42:11.830
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | ansible_engine | 2.0 | Yes |
Application | redhat | ansible_engine | 2.4 | Yes |
Application | redhat | ansible_engine | 2.5 | Yes |
Application | redhat | ansible_engine | 2.6 | Yes |
Application | redhat | ceph_storage | 2.0 | Yes |
Application | redhat | ceph_storage | 3.0 | Yes |
Application | redhat | gluster_storage | 3.0.0 | Yes |
Application | redhat | openshift | 3.0 | Yes |
Application | redhat | openstack | 10 | Yes |
Application | redhat | openstack | 12 | Yes |
Application | redhat | openstack | 13 | Yes |
Application | redhat | virtualization | 4.0 | Yes |
Application | redhat | virtualization_host | 4.0 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Application | suse | package_hub | - | Yes |
Operating System | suse | suse_linux_enterprise_server | 12 | No |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 19.04 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |