Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
Low
Attack Vector
Local
0

CVE-2020-1734

Disclosure Date: March 03, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.4 High
Impact Score:
6
Exploitability Score:
0.8
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
Attack Vector (AV):
Local
Attack Complexity (AC):
High
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
Low

General Information

Vendors

  • redhat

Products

  • ansible engine,
  • ansible engine 2.8.8,
  • ansible engine 2.9.5,
  • ansible tower,
  • ansible tower 3.4.5,
  • ansible tower 3.5.5,
  • ansible tower 3.6.3
Technical Analysis