Show filters
158 Total Results
Displaying 81-90 of 158
Sort by:
Attacker Value
Unknown

CVE-2020-1753

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
Attacker Value
Unknown

CVE-2020-1739

Disclosure Date: March 12, 2020 (last updated February 21, 2025)
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
Attacker Value
Unknown

CVE-2020-1733

Disclosure Date: March 11, 2020 (last updated February 21, 2025)
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
Attacker Value
Unknown

CVE-2020-1737

Disclosure Date: March 09, 2020 (last updated February 21, 2025)
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
Attacker Value
Unknown

CVE-2020-1734

Disclosure Date: March 03, 2020 (last updated February 21, 2025)
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
Attacker Value
Unknown

CVE-2014-4659

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Ansible before 1.5.5 sets 0644 permissions for sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by reading a file that uses the "deb http://user:pass@server:port/" format.
Attacker Value
Unknown

CVE-2014-4658

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
The vault subsystem in Ansible before 1.5.5 does not set the umask before creation or modification of a vault file, which allows local users to obtain sensitive key information by reading a file.
Attacker Value
Unknown

CVE-2014-4657

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.
Attacker Value
Unknown

CVE-2014-4660

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the "deb http://user:pass@server:port/" format.
Attacker Value
Unknown

CVE-2014-4678

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.