In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "2.0"
}
],
"cpe": "cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "2.4"
}
],
"cpe": "cpe:2.3:a:redhat:ansible_engine:2.4:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10"
}
],
"cpe": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12"
}
],
"cpe": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "13"
}
],
"cpe": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "4.0"
}
],
"cpe": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "4.0"
}
],
"cpe": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.5"
},
{
"last_affected": "2.6"
}
],
"cpe": [
"cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*"
]
}