Redhat

Ansible

51 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.45%
  • Veröffentlicht 31.07.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 02:59:42

Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansibl...

  • EPSS 2.88%
  • Veröffentlicht 22.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:31:57

Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could...

  • EPSS 0.37%
  • Veröffentlicht 04.05.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 01:51:17

Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.

Exploit
  • EPSS 3.99%
  • Veröffentlicht 24.04.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:26

Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to th...

  • EPSS 0.5%
  • Veröffentlicht 21.11.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fix...

  • EPSS 0.55%
  • Veröffentlicht 08.06.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.

  • EPSS 0.03%
  • Veröffentlicht 07.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.

  • EPSS 0.08%
  • Veröffentlicht 03.06.2016 14:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container ...

  • EPSS 0.08%
  • Veröffentlicht 12.08.2015 14:59:21
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary val...

  • EPSS 0.05%
  • Veröffentlicht 16.09.2013 19:14:39
  • Zuletzt bearbeitet 11.04.2025 00:51:21

runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.