Show filters
158 Total Results
Displaying 31-40 of 158
Sort by:
Attacker Value
Unknown

CVE-2022-3697

Disclosure Date: October 28, 2022 (last updated December 29, 2023)
A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.
Attacker Value
Unknown

CVE-2022-3644

Disclosure Date: October 25, 2022 (last updated December 22, 2024)
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
Attacker Value
Unknown

CVE-2022-3205

Disclosure Date: September 13, 2022 (last updated May 28, 2024)
Cross site scripting in automation controller UI in Red Hat Ansible Automation Platform 1.2 and 2.0 where the project name is susceptible to XSS injection
Attacker Value
Unknown

CVE-2022-1632

Disclosure Date: September 01, 2022 (last updated October 08, 2023)
An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.
Attacker Value
Unknown

CVE-2021-4112

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.
Attacker Value
Unknown

CVE-2021-4041

Disclosure Date: August 24, 2022 (last updated October 08, 2023)
A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment.
Attacker Value
Unknown

CVE-2021-3702

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.
Attacker Value
Unknown

CVE-2021-3701

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.
Attacker Value
Unknown

CVE-2022-2568

Disclosure Date: August 18, 2022 (last updated October 08, 2023)
A privilege escalation flaw was found in the Ansible Automation Platform. This flaw allows a remote authenticated user with 'change user' permissions to modify the account settings of the superuser account and also remove the superuser privileges.
Attacker Value
Unknown

CVE-2021-3681

Disclosure Date: April 18, 2022 (last updated October 07, 2023)
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.