First published: Wed Jun 07 2017(Updated: )
The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/ansible | <1.9.2 | 1.9.2 |
Redhat Ansible | <=1.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6240 is classified as a medium severity vulnerability, allowing local users to escape restricted environments.
To fix CVE-2015-6240, upgrade to Ansible version 1.9.2 or later.
Local users operating on Ansible versions prior to 1.9.2 and Red Hat Ansible versions up to 1.9.1 are affected by CVE-2015-6240.
CVE-2015-6240 allows attackers to perform symlink attacks leading to unauthorized access outside the restricted environment.
Yes, CVE-2015-6240 affects the chroot, jail, and zone connection plugins in Ansible.