The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md | Release Notes | 
| https://www.securityfocus.com/bid/68232 | Third Party Advisory VDB Entry | 
| https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md | Release Notes | 
| https://www.securityfocus.com/bid/68232 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 02:10
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md - Release Notes | |
| References | () https://www.securityfocus.com/bid/68232 - Third Party Advisory, VDB Entry | 
Information
                Published : 2020-02-20 15:15
Updated : 2024-11-21 02:10
NVD link : CVE-2014-4657
Mitre link : CVE-2014-4657
CVE.ORG link : CVE-2014-4657
JSON object : View
Products Affected
                redhat
- ansible
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
