First published: Wed Apr 05 2017(Updated: )
Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <2.3 | 2.3 |
pip/ansible | <2.2.3.0 | 2.2.3.0 |
Red Hat Ansible | <2.3 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7466 has a critical severity rating due to the potential for arbitrary code execution.
To fix CVE-2017-7466, upgrade to Ansible version 2.3 or later.
CVE-2017-7466 affects Ansible versions before 2.3 and certain versions of Red Hat OpenStack.
An attacker must have control over a client system to exploit CVE-2017-7466, making remote exploitation less likely.
An attacker exploiting CVE-2017-7466 can execute arbitrary code on the Ansible server.