An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
2023-12-18T14:15:10.500
2024-12-06T11:15:07.183
Modified
CVSSv3.1: 6.3 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | ansible_automation_platform | 1.2 | Yes |
Application | redhat | ansible_automation_platform | 2.3 | Yes |
Application | redhat | ansible_automation_platform | 2.4 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |
Operating System | redhat | enterprise_linux | 9.0 | No |
Application | redhat | ansible_inside | 1.1 | Yes |
Application | redhat | ansible_inside | 1.2 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |
Operating System | redhat | enterprise_linux | 9.0 | No |
Application | redhat | ansible_developer | 1.0 | Yes |
Application | redhat | ansible_developer | 1.1 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |
Operating System | redhat | enterprise_linux | 9.0 | No |
Operating System | debian | debian_linux | 10.0 | Yes |