Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-10874

Опубликовано: 02 июл. 2018
Источник: debian
EPSS Низкий

Описание

In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ansiblefixed2.6.1+dfsg-1package
ansiblenot-affectedstretchpackage
ansiblenot-affectedjessiepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1596528

  • https://github.com/ansible/ansible/pull/42067

  • https://github.com/ansible/ansible/commit/1f80949f964a946773f9d3ac1899535bd2cc2b8e

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.

CVSS3: 7.8
redhat
больше 7 лет назад

In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.

CVSS3: 7.8
nvd
больше 7 лет назад

In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.

CVSS3: 7.8
github
больше 3 лет назад

Ansible Improper Input Validation vulnerability

CVSS3: 7.8
fstec
больше 7 лет назад

Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 14%
0.00047
Низкий