Show filters
158 Total Results
Displaying 31-40 of 158
Sort by:
Attacker Value
Unknown
CVE-2022-3697
Disclosure Date: October 28, 2022 (last updated December 29, 2023)
A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.
0
Attacker Value
Unknown
CVE-2022-3644
Disclosure Date: October 25, 2022 (last updated December 22, 2024)
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
0
Attacker Value
Unknown
CVE-2022-3205
Disclosure Date: September 13, 2022 (last updated May 28, 2024)
Cross site scripting in automation controller UI in Red Hat Ansible Automation Platform 1.2 and 2.0 where the project name is susceptible to XSS injection
0
Attacker Value
Unknown
CVE-2022-1632
Disclosure Date: September 01, 2022 (last updated October 08, 2023)
An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.
0
Attacker Value
Unknown
CVE-2021-4112
Disclosure Date: August 25, 2022 (last updated October 08, 2023)
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.
0
Attacker Value
Unknown
CVE-2021-4041
Disclosure Date: August 24, 2022 (last updated October 08, 2023)
A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment.
0
Attacker Value
Unknown
CVE-2021-3702
Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.
0
Attacker Value
Unknown
CVE-2021-3701
Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2022-2568
Disclosure Date: August 18, 2022 (last updated October 08, 2023)
A privilege escalation flaw was found in the Ansible Automation Platform. This flaw allows a remote authenticated user with 'change user' permissions to modify the account settings of the superuser account and also remove the superuser privileges.
0
Attacker Value
Unknown
CVE-2021-3681
Disclosure Date: April 18, 2022 (last updated October 07, 2023)
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.
0