A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
{
"cwe_ids": [
"CWE-78"
],
"github_reviewed": true,
"nvd_published_at": "2020-03-03T22:15:00Z",
"github_reviewed_at": "2021-04-02T18:38:15Z",
"severity": "HIGH"
}