Description
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0028 | A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts. |
Github GHSA |
GHSA-h39q-95q5-9jfp | OS Command Injection in ansible |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.815Z
Reserved: 2019-11-27T00:00:00.000Z
Link: CVE-2020-1734
No data.
Status : Modified
Published: 2020-03-03T22:15:10.843
Modified: 2024-11-21T05:11:16.197
Link: CVE-2020-1734
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA