Search for packages
purl | pkg:deb/ubuntu/ansible@2.5.3%2Bdfsg-2 |
Next non-vulnerable version | 2.9.6+dfsg-1 |
Latest non-vulnerable version | 2.9.6+dfsg-1 |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1puc-u4y9-aaap
Aliases: CVE-2019-14904 GHSA-gwr8-5j83-483c PYSEC-2020-161 PYSEC-2020-180 |
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected. |
Affected by 1 other vulnerability. |
VCID-3tap-8hpn-aaad
Aliases: CVE-2019-10217 GHSA-p75j-wc34-527c PYSEC-2019-3 PYSEC-2019-73 |
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks. |
Affected by 4 other vulnerabilities. |
VCID-4256-s7ta-aaar
Aliases: CVE-2018-16837 GHSA-hwrm-63v2-42g4 PYSEC-2018-44 |
Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list. |
Affected by 8 other vulnerabilities. |
VCID-4tsx-tb15-aaar
Aliases: CVE-2019-10206 GHSA-cqmr-rcpr-cxh3 PYSEC-2019-145 |
ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them. |
Affected by 4 other vulnerabilities. |
VCID-5r5b-u8py-aaan
Aliases: CVE-2016-8614 GHSA-cmwx-9m2h-x7v4 PYSEC-2018-37 |
A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key. |
Affected by 9 other vulnerabilities. |
VCID-9e5w-5m3m-aaaj
Aliases: CVE-2017-7481 GHSA-w578-j992-554x PYSEC-2018-41 |
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated. |
Affected by 9 other vulnerabilities. |
VCID-m1j9-6xnm-aaac
Aliases: CVE-2019-14864 GHSA-3m93-m4q6-mc6v PYSEC-2020-160 PYSEC-2020-179 |
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data. |
Affected by 3 other vulnerabilities. |
VCID-px3x-t4ay-aaaa
Aliases: CVE-2018-10875 GHSA-fc4h-467w-46rh PYSEC-2018-43 |
A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. |
Affected by 9 other vulnerabilities. |
VCID-q52e-x2mz-aaaa
Aliases: CVE-2016-8647 GHSA-x4cm-m36h-c6qj PYSEC-2018-58 |
An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. |
Affected by 9 other vulnerabilities. |
VCID-ucre-31md-aaad
Aliases: CVE-2019-14846 GHSA-pm48-cvv2-29q5 PYSEC-2019-4 PYSEC-2019-74 |
In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process. |
Affected by 4 other vulnerabilities. |
VCID-wkkk-5njy-aaaa
Aliases: CVE-2019-14905 GHSA-frxj-5j27-f8rf PYSEC-2020-206 |
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues. |
Affected by 1 other vulnerability. |
VCID-yxbw-377b-aaan
Aliases: CVE-2020-10729 GHSA-r6h7-5pq2-j77h PYSEC-2021-105 |
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. |
Affected by 0 other vulnerabilities. |
VCID-yxyq-9868-aaaj
Aliases: CVE-2018-10874 GHSA-3xvg-x47j-x75w PYSEC-2018-81 |
In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result. |
Affected by 9 other vulnerabilities. |
VCID-zk4f-r19r-aaap
Aliases: CVE-2019-14858 GHSA-h653-95qw-h2mp PYSEC-2019-171 |
A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task. |
Affected by 4 other vulnerabilities. |
VCID-zxh4-zrbz-aaaf
Aliases: CVE-2014-4967 GHSA-64cw-m57j-65xj PYSEC-2020-205 |
Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing " src=" clause, (2) a trailing " temp=" clause, or (3) a trailing " validate=" clause accompanied by a shell command. |
Affected by 9 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|