First published: Mon Mar 16 2020(Updated: )
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | <=2.7.16 | |
Redhat Ansible | >=2.8.0<=2.8.8 | |
Redhat Ansible | >=2.9.0<=2.9.5 | |
Redhat Ansible Tower | <=3.3.4 | |
Redhat Ansible Tower | >=3.3.5<=3.4.5 | |
Redhat Ansible Tower | >=3.5.0<=3.5.5 | |
Redhat Ansible Tower | >=3.6.0<=3.6.3 | |
Redhat Cloudforms Management Engine | =5.0 | |
Redhat Openstack | =13 | |
pip/ansible | >=2.9.0a1<=2.9.6 | |
pip/ansible | >=2.8.0a1<=2.8.10 | |
pip/ansible | >=0<=2.7.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1738 is a vulnerability in Ansible Engine when the module package or service is used without specifying the 'use' parameter.
The severity of CVE-2020-1738 is rated as low, with a severity value of 3.9.
Versions 2.7.x, 2.8.x, and 2.9.x branches of Ansible are affected by CVE-2020-1738.
To fix CVE-2020-1738, it is recommended to specify the 'use' parameter when using the module package or service in Ansible.
More information about CVE-2020-1738 can be found at the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738), [GitHub](https://github.com/ansible/ansible/issues/67796), [Gentoo Security](https://security.gentoo.org/glsa/202006-11).