National Vulnerability Database

National Vulnerability Database

National Vulnerability

Search Results (Refine Search)

Search Parameters:
  • Contains Software Flaws (CVE)
  • CPE Product Version: cpe:/a:redhat:ansible:0.3.1
There are 11 matching records.
Vuln ID Summary CVSS Severity

Ansible prior to 1.5.4 mishandles the evaluation of some strings.

Published: January 09, 2020; 08:15:10 AM -05:00
V3.1: 7.5 HIGH
    V2: 5.0 MEDIUM

A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.

Published: July 30, 2019; 07:15:12 PM -04:00
V3.0: 5.4 MEDIUM
    V2: 5.5 MEDIUM

A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

Published: July 31, 2018; 05:29:00 PM -04:00
V3.0: 7.5 HIGH
    V2: 5.0 MEDIUM

Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.

Published: July 31, 2018; 04:29:00 PM -04:00
V3.0: 9.1 CRITICAL
    V2: 9.0 HIGH

Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.

Published: June 22, 2018; 09:29:00 AM -04:00
V3.0: 8.0 HIGH
    V2: 8.5 HIGH

Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.

Published: May 04, 2018; 04:29:00 PM -04:00
V3.0: 7.4 HIGH
    V2: 5.8 MEDIUM

The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.

Published: June 08, 2017; 02:29:00 PM -04:00
V3.0: 8.8 HIGH
    V2: 6.5 MEDIUM

The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.

Published: June 07, 2017; 04:29:00 PM -04:00
V3.0: 7.8 HIGH
    V2: 7.2 HIGH

The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.

Published: June 03, 2016; 10:59:04 AM -04:00
V3.0: 7.8 HIGH
    V2: 7.2 HIGH

Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Published: August 12, 2015; 10:59:21 AM -04:00
    V2: 4.3 MEDIUM

runner/connection_plugins/ in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.

Published: September 16, 2013; 03:14:39 PM -04:00
    V2: 1.9 LOW