First published: Tue Dec 13 2016(Updated: )
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <2.1.4 | 2.1.4 |
redhat/ansible | <2.2.1 | 2.2.1 |
pip/ansible | =2.2.0.0 | 2.2.1.0 |
pip/ansible | <=2.1.3.0 | 2.1.4.0 |
Red Hat Ansible | <2.1.4 | |
Ansible | <2.2.1 | |
Red Hat OpenStack for IBM Power | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9587 is considered to have a moderate severity level due to improper input validation in Ansible.
To fix CVE-2016-9587, update Ansible to versions 2.1.4 or 2.2.1 or later.
CVE-2016-9587 affects users of Ansible versions earlier than 2.1.4 and 2.2.1.
CVE-2016-9587 is a vulnerability related to improper input validation.
Yes, CVE-2016-9587 can be exploited by an attacker with control over a client system sending data to the Ansible server.