Описание
Argument Injection in Ansible
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-1738
- https://github.com/ansible/ansible/issues/67796
- https://github.com/ansible/ansible/pull/67808
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738
- https://github.com/advisories/GHSA-f85h-23mf-2fwh
- https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-10.yaml
- https://security.gentoo.org/glsa/202006-11
Пакеты
ansible
<= 2.7.16
Отсутствует
ansible
>= 2.8.0a1, <= 2.8.10
Отсутствует
ansible
>= 2.9.0a1, <= 2.9.6
Отсутствует
Связанные уязвимости
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
A flaw was found in Ansible Engine when the module package or service ...