Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  Debian DLA | 
                DLA-3963-1 | ansible security update | 
  EUVD | 
                EUVD-2024-3182 | A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner. | 
  Github GHSA | 
                GHSA-32p4-gm2c-wmch | ansible-core Incorrect Authorization vulnerability | 
Solution
No solution given by the vendor.
Workaround
In the play that uses the user module with the key generation option, have a prior task ensuring the public key does not exist for example: - name: avoid user exploit (change name depending on other options used in user task) file: path=/home/{{username}}/.ssh/id_rsa.pub state=absent
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Sat, 30 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat ansible Core
         | 
|
| CPEs | cpe:/a:redhat:ansible_core:2::el8 cpe:/a:redhat:ansible_core:2::el9  | 
|
| Vendors & Products | 
        
        Redhat ansible Core
         | 
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Sat, 05 Jul 2025 05:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat enterprise Linux
         | 
|
| CPEs | cpe:/o:redhat:enterprise_linux:10 | |
| Vendors & Products | 
        
        Redhat enterprise Linux
         | 
Tue, 25 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openstack:17.1::el9 | |
| References | 
         | 
Tue, 03 Dec 2024 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:ansible_automation_platform:2.4::el8 cpe:/a:redhat:ansible_automation_platform:2.4::el9 cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8 cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9 cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8 cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9  | 
|
| References | 
         | 
Sun, 24 Nov 2024 23:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat ansible Automation Platform Developer
         Redhat ansible Automation Platform Inside  | 
|
| CPEs | cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8 cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9 cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8 cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9  | 
|
| Vendors & Products | 
        
        Redhat ansible Automation Platform Developer
         Redhat ansible Automation Platform Inside  | 
|
| References | 
         | 
Fri, 22 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:ansible_automation_platform:2.5::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el9  | 
Wed, 06 Nov 2024 20:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:ansible_automation_platform:ee::el8 cpe:/a:redhat:ansible_automation_platform:ee::el9  | 
|
| References | 
         | 
Wed, 06 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 06 Nov 2024 13:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        
        threat_severity
         
  | 
Wed, 06 Nov 2024 10:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner. | |
| Title | Ansible-core: ansible-core user may read/write unauthorized content | |
| First Time appeared | 
        
        Redhat
         Redhat ansible Automation Platform Redhat openstack  | 
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:openstack:17.1  | 
|
| Vendors & Products | 
        
        Redhat
         Redhat ansible Automation Platform Redhat openstack  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-03T22:33:34.510Z
Reserved: 2024-10-12T02:46:57.580Z
Link: CVE-2024-9902
Updated: 2024-11-06T14:21:02.895Z
Status : Awaiting Analysis
Published: 2024-11-06T10:15:06.200
Modified: 2025-11-03T23:17:34.743
Link: CVE-2024-9902
                        OpenCVE Enrichment
                    No data.
 Debian DLA
 EUVD
 Github GHSA