First published: Fri Jun 29 2018(Updated: )
In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/ansible | >=2.6<2.6.1 | 2.6.1 |
pip/ansible | >=2.5<2.5.6 | 2.5.6 |
pip/ansible | >=0<2.4.6.0 | 2.4.6.0 |
debian/ansible | 2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 2.10.7+merged+base+2.10.17+dfsg-0+deb11u2 7.7.0+dfsg-3+deb12u1 11.1.0+dfsg-1 | |
Red Hat Ansible Engine | =2.0 | |
Red Hat Ansible Engine | =2.4 | |
Red Hat Ansible Engine | =2.5 | |
Red Hat Ansible Engine | =2.6 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =12 | |
Red Hat OpenStack for IBM Power | =13 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Virtualization Host EUS | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10874 is a vulnerability in Ansible that allows arbitrary code execution.
Versions 2.5.1+dfsg-1ubuntu0.1, 2.6.1+dfsg-1, and earlier are affected.
Upgrade to version 2.5.1+dfsg-1ubuntu0.1 or later of the ansible package.
Upgrade to a version of Redhat Ansible Engine that is not affected by the vulnerability.
Yes, you can find more information at the following references: http://www.securitytracker.com/id/1041396, https://access.redhat.com/errata/RHBA-2018:3788, https://access.redhat.com/errata/RHSA-2018:2150.