First published: Thu Nov 02 2023(Updated: )
A flaw was found in Ansible, where a user's controller is vulnerable to template injection when internal templating operations may errantly remove the unsafe designation from template data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ansible | <=2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 | 7.7.0+dfsg-3+deb12u1 10.1.0+dfsg-1 |
debian/ansible-core | 2.14.16-0+deb12u1 2.17.1-1 2.17.3-1 | |
pip/ansible-core | <2.14.12 | 2.14.12 |
pip/ansible-core | >=2.15.0<2.15.8 | 2.15.8 |
pip/ansible-core | >=2.16.0<2.16.1 | 2.16.1 |
Red Hat Ansible | <2.14.12 | |
Red Hat Ansible | >=2.15.0<2.15.7 | |
Red Hat Ansible | =2.16.0 | |
Red Hat Ansible | =2.16.0-beta1 | |
Red Hat Ansible | =2.16.0-beta2 | |
Red Hat Ansible | =2.16.0-rc1 | |
Fedora EPEL | =8.0 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
All of | ||
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Any of | ||
Red Hat Ansible Automation Platform | =2.4 | |
Red Hat Ansible Developer | =1.1 | |
Red Hat Ansible Inside | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5764 is categorized as medium due to the potential for template injection.
To fix CVE-2023-5764, upgrade to Ansible version 2.10.8 or later, or an appropriate patched version as listed in the remediation guide.
CVE-2023-5764 affects several versions of Ansible, specifically those prior to 2.10.8 and certain versions of Ansible-Core.
Template injection in CVE-2023-5764 refers to a flaw whereby unsafe template data could be executed, leading to potential unauthorized actions.
No, not all distributions of Ansible are affected; the vulnerability primarily impacts specific versions from Debian, Red Hat, and Fedora.