First published: Wed Aug 23 2023(Updated: )
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/ansible | <8.5.0 | 8.5.0 |
redhat/ansible | <2.14.11 | 2.14.11 |
All of | ||
Any of | ||
redhat ANSIBLE automation platform | =1.2 | |
redhat ANSIBLE automation platform | =2.3 | |
redhat ANSIBLE automation platform | =2.4 | |
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Red Hat Ansible Inside | =1.1 | |
Red Hat Ansible Inside | =1.2 | |
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Red Hat Ansible Developer | =1.0 | |
Red Hat Ansible Developer | =1.1 | |
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5115 has a high severity rating due to its potential to enable an absolute path traversal attack.
To fix CVE-2023-5115, upgrade to Ansible version 8.5.0 or later, or for Red Hat, upgrade to version 2.14.11.
CVE-2023-5115 affects all Ansible versions prior to 8.5.0 and 2.14.11 for Red Hat users.
Yes, CVE-2023-5115 can affect Red Hat Enterprise Linux when using vulnerable versions of the Ansible automation platform.
An absolute path traversal attack allows an attacker to overwrite files outside the intended extraction path by exploiting symlinks in the Ansible roles.