Description
The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1923-1 | ansible security update |
EUVD |
EUVD-2017-0003 | The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack. |
Github GHSA |
GHSA-wwwh-47wp-m522 | Ansible Sandbox Escape via Symlink Attack |
Ubuntu USN |
USN-7330-1 | Ansible vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T07:15:13.380Z
Reserved: 2015-08-14T00:00:00.000Z
Link: CVE-2015-6240
No data.
Status : Modified
Published: 2017-06-07T20:29:00.287
Modified: 2026-05-13T00:24:29.033
Link: CVE-2015-6240
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN