First published: Tue Feb 12 2019(Updated: )
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | >=2.5.0<2.5.15 | |
Redhat Ansible | >=2.6.0<2.6.14 | |
Redhat Ansible | >=2.7.0<2.7.8 | |
redhat/ansible-engine | <2.5.15 | 2.5.15 |
redhat/ansible-engine | <2.6.14 | 2.6.14 |
redhat/ansible-engine | <2.7.8 | 2.7.8 |
debian/ansible | 2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 7.7.0+dfsg-3+deb12u1 10.1.0+dfsg-1 | |
pip/ansible | >=2.7.0a1<2.7.8 | 2.7.8 |
pip/ansible | >=2.6.0a1<2.6.14 | 2.6.14 |
pip/ansible | <2.5.15 | 2.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3828 is a path traversal vulnerability in the Ansible fetch module before versions 2.5.15, 2.6.14, and 2.7.8.
CVE-2019-3828 allows an attacker to copy and overwrite files outside of the specified destination in the local Ansible controller host.
The severity of CVE-2019-3828 is medium with a CVSS score of 4.2.
To fix CVE-2019-3828 in Ansible, upgrade to version 2.5.15, 2.6.14, or 2.7.8.
More information about CVE-2019-3828 can be found on the NVD (National Vulnerability Database) and GitHub.