OS Command Injection Affecting ansible package, versions <2.7.16-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about OS Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE39-ANSIBLE-589720
  • published1 Jan 2020
  • disclosed26 Aug 2020

Introduced: 1 Jan 2020

CVE-2019-14904  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade Alpine:3.9 ansible to version 2.7.16-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ansible package and not the ansible package as distributed by Alpine. See How to fix? for Alpine:3.9 relevant fixed versions and status.

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

CVSS Scores

version 3.1