First published: Tue Nov 26 2019(Updated: )
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible-engine | <2.9.4 | 2.9.4 |
redhat/ansible-engine | <2.8.8 | 2.8.8 |
redhat/ansible-engine | <2.7.16 | 2.7.16 |
Redhat Ansible Engine | >=2.7.0<2.7.16 | |
Redhat Ansible Engine | >=2.8.0<2.8.8 | |
Redhat Ansible Engine | >=2.9.0<2.9.3 | |
Redhat Ansible Tower | =3.0.0 | |
Redhat Ceph Storage | =3.0 | |
Redhat Cloudforms Management Engine | =5.0 | |
Redhat Openstack | =13 | |
Fedoraproject Fedora | =30 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
pip/ansible | >=2.9.0a1<2.9.3 | 2.9.3 |
pip/ansible | >=2.8.0a1<2.8.8 | 2.8.8 |
pip/ansible | >=2.7.0a1<2.7.16 | 2.7.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-14905.
The severity rating of CVE-2019-14905 is high (5.6).
The affected versions are 2.9.x before 2.9.3, 2.8.x before 2.8.8, and 2.7.x before 2.7.16.
An attacker can exploit this vulnerability by crafting a malicious filename parameter to perform arbitrary commands on NXOS devices.
To fix CVE-2019-14905, upgrade to Ansible Engine version 2.9.4, 2.8.8, or 2.7.16.