Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWY4NWgtMjNtZi0yZndo
Argument Injection in Ansible
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Permalink: https://github.com/advisories/GHSA-f85h-23mf-2fwhJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWY4NWgtMjNtZi0yZndo
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 3 years ago
Updated: 3 months ago
CVSS Score: 3.9
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Identifiers: GHSA-f85h-23mf-2fwh, CVE-2020-1738
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-1738
- https://github.com/ansible/ansible/issues/67796
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738
- https://security.gentoo.org/glsa/202006-11
- https://github.com/ansible/ansible/pull/67808
- https://github.com/advisories/GHSA-f85h-23mf-2fwh
- https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-10.yaml
Blast Radius: 16.3
Affected Packages
pypi:ansible
Dependent packages: 125Dependent repositories: 14,706
Downloads: 5,784,674 last month
Affected Version Ranges: >= 2.9.0a1, <= 2.9.6, >= 2.8.0a1, <= 2.8.10, >= 0, <= 2.7.16
No known fixed version
All affected versions: 1.2.1, 1.2.2, 1.2.3, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 1.6.9, 1.6.10, 1.7.1, 1.7.2, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.9.0, 1.9.1, 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.9.6, 2.0.0, 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.5.5, 2.5.6, 2.5.7, 2.5.8, 2.5.9, 2.5.10, 2.5.11, 2.5.12, 2.5.13, 2.5.14, 2.5.15, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.7.5, 2.7.6, 2.7.7, 2.7.8, 2.7.9, 2.7.10, 2.7.11, 2.7.12, 2.7.13, 2.7.14, 2.7.15, 2.7.16, 2.8.0, 2.8.0-a1, 2.8.0-b1, 2.8.0-rc1, 2.8.0-rc2, 2.8.0-rc3, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.8.5, 2.8.6, 2.8.7, 2.8.8, 2.8.9, 2.8.10, 2.9.0, 2.9.0-b1, 2.9.0-rc1, 2.9.0-rc2, 2.9.0-rc3, 2.9.0-rc4, 2.9.0-rc5, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.6