Description
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2020-0019 | A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. |
Github GHSA |
GHSA-p62g-jhg6-v3rq | Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:06:10.659Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10684
No data.
Status : Modified
Published: 2020-03-24T14:15:12.327
Modified: 2024-11-21T04:55:50.877
Link: CVE-2020-10684
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA