Description
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2020-0019 | A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. |
Github GHSA |
GHSA-p62g-jhg6-v3rq | Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:06:10.659Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10684
No data.
Status : Modified
Published: 2020-03-24T14:15:12.327
Modified: 2024-11-21T04:55:50.877
Link: CVE-2020-10684
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA