Redhat

Ansible Developer

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 16.10.2024 17:15:13
  • Last modified 26.03.2025 05:15:39

A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. This flaw allows a malicious user to perform actions that impact users by using the "?next=" in a URL, which can lead to redirecting...

  • EPSS 0.06%
  • Published 06.02.2024 12:15:55
  • Last modified 17.01.2025 20:15:27

An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this iss...

  • EPSS 0.34%
  • Published 18.12.2023 14:15:10
  • Last modified 06.12.2024 11:15:07

An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path...

  • EPSS 0.07%
  • Published 12.12.2023 22:15:22
  • Last modified 21.11.2024 08:42:26

A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating i...

  • EPSS 0.44%
  • Published 04.10.2023 15:15:12
  • Last modified 21.11.2024 08:18:25

An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.

  • EPSS 0.08%
  • Published 04.10.2023 15:15:12
  • Last modified 21.11.2024 08:34:58

A logic flaw exists in Ansible Automation platform. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confid...