A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ansible_automation_platform:ee::el8 cpe:/a:redhat:ansible_automation_platform:ee::el9 |
|
References |
|
Wed, 06 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 06 Nov 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 06 Nov 2024 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner. | |
Title | Ansible-core: ansible-core user may read/write unauthorized content | |
First Time appeared |
Redhat
Redhat ansible Automation Platform Redhat openstack |
|
Weaknesses | CWE-863 | |
CPEs | cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:openstack:17.1 |
|
Vendors & Products |
Redhat
Redhat ansible Automation Platform Redhat openstack |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-11-06T09:56:54.505Z
Updated: 2024-11-15T20:48:44.478Z
Reserved: 2024-10-12T02:46:57.580Z
Link: CVE-2024-9902
Vulnrichment
Updated: 2024-11-06T14:21:02.895Z
NVD
Status : Awaiting Analysis
Published: 2024-11-06T10:15:06.200
Modified: 2024-11-06T20:15:07.820
Link: CVE-2024-9902
Redhat