First published: Fri Jun 29 2018(Updated: )
In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Engine | =2.0 | |
Redhat Ansible Engine | =2.4 | |
Redhat Ansible Engine | =2.5 | |
Redhat Ansible Engine | =2.6 | |
Redhat Openstack | =10 | |
Redhat Openstack | =12 | |
Redhat Openstack | =13 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization Host | =4.0 | |
ubuntu/ansible | <2.5.1+dfsg-1ubuntu0.1 | 2.5.1+dfsg-1ubuntu0.1 |
ubuntu/ansible | <2.6.1+dfsg-1 | 2.6.1+dfsg-1 |
debian/ansible | 2.7.7+dfsg-1+deb10u1 2.7.7+dfsg-1+deb10u2 2.10.7+merged+base+2.10.8+dfsg-1 7.3.0+dfsg-1 7.7.0+dfsg-3 9.5.1+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10874 is a vulnerability in Ansible that allows arbitrary code execution.
Versions 2.5.1+dfsg-1ubuntu0.1, 2.6.1+dfsg-1, and earlier are affected.
Upgrade to version 2.5.1+dfsg-1ubuntu0.1 or later of the ansible package.
Upgrade to a version of Redhat Ansible Engine that is not affected by the vulnerability.
Yes, you can find more information at the following references: http://www.securitytracker.com/id/1041396, https://access.redhat.com/errata/RHBA-2018:3788, https://access.redhat.com/errata/RHSA-2018:2150.