Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): ansible
- Search Type: Search All
- CPE Name Search: false
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-1657 |
A flaw was found in the ansible automation platform. An insecure WebSocket connection was being used in installation from the Ansible rulebook EDA server. An attacker that has access to any machine in the CIDR block could download all rulebook data from the WebSocket, resulting in loss of confidentiality and integrity of the system. Published: April 25, 2024; 1:15:48 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-29202 |
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7. Published: March 29, 2024; 11:15:12 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-29201 |
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7. Published: March 29, 2024; 11:15:11 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-0690 |
An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values. Published: February 06, 2024; 7:15:55 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-5115 |
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path. Published: December 18, 2023; 9:15:10 AM -0500 |
V3.1: 6.3 MEDIUM V2.0:(not available) |
CVE-2023-5764 |
A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data. Published: December 12, 2023; 5:15:22 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-5189 |
A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten. Published: November 14, 2023; 6:15:12 PM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-4380 |
A logic flaw exists in Ansible Automation platform. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability. Published: October 04, 2023; 11:15:12 AM -0400 |
V3.1: 6.3 MEDIUM V2.0:(not available) |
CVE-2023-4237 |
A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability. Published: October 04, 2023; 11:15:12 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-39059 |
An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter. Published: August 28, 2023; 6:15:08 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-32983 |
Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier does not mask extra variables displayed on the configuration form, increasing the potential for attackers to observe and capture them. Published: May 16, 2023; 12:15:10 PM -0400 |
V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2023-32982 |
Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier stores extra variables unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Published: May 16, 2023; 12:15:10 PM -0400 |
V3.1: 4.3 MEDIUM V2.0:(not available) |
CVE-2023-28609 |
api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication. Published: March 18, 2023; 5:15:11 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2014-125036 |
A vulnerability, which was classified as problematic, has been found in drybjed ansible-ntp. Affected by this issue is some unknown functionality of the file meta/main.yml. The manipulation leads to insufficient control of network message volume. The attack can only be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as ed4ca2cf012677973c220cdba36b5c60bfa0260b. It is recommended to apply a patch to fix this issue. VDB-217190 is the identifier assigned to this vulnerability. Published: January 02, 2023; 2:15:10 PM -0500 |
V3.1: 4.3 MEDIUM V2.0:(not available) |
CVE-2022-3697 |
A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. Published: October 28, 2022; 12:15:16 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-3205 |
Cross site scripting in automation controller UI in Red Hat Ansible Automation Platform 1.2 and 2.0 where the project name is susceptible to XSS injection Published: September 13, 2022; 4:15:09 PM -0400 |
V3.1: 6.1 MEDIUM V2.0:(not available) |
CVE-2021-4112 |
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment. Published: August 25, 2022; 4:15:09 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2021-4041 |
A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment. Published: August 24, 2022; 12:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2021-3702 |
A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality. Published: August 23, 2022; 12:15:09 PM -0400 |
V3.1: 6.3 MEDIUM V2.0:(not available) |
CVE-2021-3701 |
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity. Published: August 23, 2022; 12:15:09 PM -0400 |
V3.1: 6.6 MEDIUM V2.0:(not available) |