Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14904

Опубликовано: 27 нояб. 2019
Источник: redhat
CVSS3: 7.3

Описание

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host.

Отчет

Because a flaw exploit would depend on the use of Solaris and Red Hat does not support RHOSP on Solaris, the RHOSP Ansible package will not be updated at this time. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

Меры по смягчению последствий

Currently, there is no mitigation for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5ansibleNot affected
Red Hat Ansible Tower 3ansibleAffected
Red Hat Ceph Storage 2ansibleOut of support scope
Red Hat Ceph Storage 3ansibleOut of support scope
Red Hat OpenStack Platform 10 (Newton)ansibleOut of support scope
Red Hat OpenStack Platform 13 (Queens)ansibleOut of support scope
Red Hat OpenStack Platform 14 (Rocky)ansibleOut of support scope
Red Hat Storage 3ansibleWill not fix
Red Hat Ansible Engine 2.7 for RHEL 7ansibleFixedRHSA-2020:021723.01.2020
Red Hat Ansible Engine 2.8 for RHEL 7ansibleFixedRHSA-2020:021623.01.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1776944Ansible: vulnerability in solaris_zone module via crafted solaris zone

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 5 лет назад

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

CVSS3: 7.3
nvd
больше 5 лет назад

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

CVSS3: 7.3
debian
больше 5 лет назад

A flaw was found in the solaris_zone module from the Ansible Community ...

CVSS3: 7.3
github
почти 5 лет назад

OS Command Injection and Improper Input Validation in ansible

CVSS3: 7.3
fstec
больше 5 лет назад

Уязвимость модуля solaris_zone системы управления конфигурациями Ansible, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

7.3 High

CVSS3