An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100824 | Third Party Advisory VDB Entry |
https://github.com/tomoh1r/ansible-vault/blob/v1.0.5/CHANGES.txt | Third Party Advisory |
https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04 | Third Party Advisory |
https://github.com/tomoh1r/ansible-vault/issues/4 | Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-09-14 19:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-2809
Mitre link : CVE-2017-2809
CVE.ORG link : CVE-2017-2809
JSON object : View
Products Affected
ansible-vault_project
- ansible-vault
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')