A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
History
04 Aug 2021, 17:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* |
Information
Published : 2018-07-13 22:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-10875
Mitre link : CVE-2018-10875
CVE.ORG link : CVE-2018-10875
JSON object : View
Products Affected
redhat
- gluster_storage
- ceph_storage
- openshift
- virtualization
- openstack
- virtualization_host
- ansible_engine
debian
- debian_linux
suse
- suse_linux_enterprise_server
- package_hub
canonical
- ubuntu_linux
CWE
CWE-426
Untrusted Search Path