A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738 | Issue Tracking Vendor Advisory |
https://github.com/ansible/ansible/issues/67796 | Third Party Advisory |
https://security.gentoo.org/glsa/202006-11 |
Configurations
Configuration 1 (hide)
|
History
04 Aug 2021, 17:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* |
Information
Published : 2020-03-16 16:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-1738
Mitre link : CVE-2020-1738
CVE.ORG link : CVE-2020-1738
JSON object : View
Products Affected
redhat
- cloudforms_management_engine
- ansible
- openstack
- ansible_tower
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')