Arbitrary Code Execution Affecting ansible package, versions [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-ANSIBLE-560366
  • published16 Mar 2020
  • disclosed16 Mar 2020
  • creditUnknown

Introduced: 16 Mar 2020

CVE-2020-1738  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade ansible to version 2.7.17, 2.8.11, 2.9.7 or higher.

Overview

ansible is a simple IT automation system.

Affected versions of this package are vulnerable to Arbitrary Code Execution. A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file.

Both package and service modules use facts to determine the name of the module to run if use is not passed to the module. The ansible_facts['pkg_mgr'] and ansible_facts['service_mgr'] facts could be set to another module name or a module name installed in a collection such as ansible_collections.namespace.name./tmp/reverse-shell, which would allow arbitrary code execution on the managed node.

Note The maintainer disputes this vulnerability

CVSS Scores

version 3.1