First published: Mon Jun 07 2021(Updated: )
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Automation Platform | =1.2 | |
Redhat Ansible Engine | <2.9.23 | |
Redhat Ansible Tower | <3.7.0 | |
redhat/ansible_tower | <3.7 | 3.7 |
redhat/ansible_engine | <2.9.23 | 2.9.23 |
pip/ansible | >=2.11.0a1<2.11.2rc1 | 2.11.2rc1 |
pip/ansible | >=2.10.0a1<2.10.11rc1 | 2.10.11rc1 |
pip/ansible | >=0<2.9.23rc1 | 2.9.23rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw is CVE-2021-3583.
The severity of CVE-2021-3583 is high (7.1).
The software products affected by CVE-2021-3583 are Redhat Ansible Automation Platform 1.2, Redhat Ansible Engine up to version 2.9.23, and Redhat Ansible Tower up to version 3.7.0.
This vulnerability can be exploited by injecting malicious templates into multi-line YAML strings when handling facts.
Yes, there is a fix available for CVE-2021-3583. It is recommended to update to the latest version of the affected software.