Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4cvm-5776-jx9f

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

Ansible Arbitrary Code Execution

User module in ansible before 1.6.6 is vulnerable to command execution. Ansible can get the result of remote command in variable, which may come from untrusted source of input. If the content of variable isn't properly filtered and when attempting to use the variable, it will trigger a function that passes it through jinja 2 template engine that can result into arbitrary command execution. Under certain circumstances, unprivileged user on system that is being managed via ansible can execute code on the managing host under UID of running ansible process.

Пакеты

Наименование

ansible

pip
Затронутые версииВерсия исправления

< 1.6.6

1.6.6

EPSS

Процентиль: 67%
0.00548
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.

redhat
больше 11 лет назад

The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.

CVSS3: 8.8
nvd
больше 8 лет назад

The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.

CVSS3: 8.8
debian
больше 8 лет назад

The user module in ansible before 1.6.6 allows remote authenticated us ...

EPSS

Процентиль: 67%
0.00548
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-20