First published: Mon Oct 24 2016(Updated: )
Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Ansible | <2.2.0 | 2.2.0 |
pip/ansible | >=0<2.2.0.0 | 2.2.0.0 |
Red Hat Ansible | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8628 is considered a critical vulnerability due to its ability to allow arbitrary command execution on Ansible clients.
To fix CVE-2016-8628, upgrade Ansible to version 2.2.0 or later.
CVE-2016-8628 affects all versions of Ansible prior to 2.2.0.
Yes, CVE-2016-8628 can be exploited remotely by attackers with access to the Ansible controller.
The implications of CVE-2016-8628 include potential unauthorized access and control over Ansible-managed systems.