First published: Tue Feb 11 2020(Updated: )
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses `subprocess.Popen()` with `shell=True`, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Engine | <=2.7.16 | |
Redhat Ansible Engine | =2.8.8 | |
Redhat Ansible Engine | =2.9.5 | |
Redhat Ansible Tower | <=3.3.4 | |
Redhat Ansible Tower | =3.4.5 | |
Redhat Ansible Tower | =3.5.5 | |
Redhat Ansible Tower | =3.6.3 | |
pip/ansible | <2.8.13 | 2.8.13 |
pip/ansible | >=2.9.0a1<2.9.11 | 2.9.11 |
pip/ansible | >=2.10.0a1<2.10.0rc1 | 2.10.0rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1734 is a vulnerability in the pipe lookup plugin of Ansible that allows arbitrary commands to be run.
CVE-2020-1734 works by overwriting Ansible facts and running arbitrary commands when the pipe lookup plugin uses subprocess.Popen() with shell=True and the variable is not escaped by the quote plugin.
The severity of CVE-2020-1734 is high with a CVSS score of 7.4.
Versions up to and including Ansible 2.10 are affected by CVE-2020-1734.
To fix CVE-2020-1734, upgrade to a version of Ansible that is not affected by the vulnerability.