In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "2.0"
}
],
"cpe": "cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "2.4"
}
],
"cpe": "cpe:2.3:a:redhat:ansible_engine:2.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "10"
}
],
"cpe": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "12"
}
],
"cpe": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "13"
}
],
"cpe": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "4.0"
}
],
"cpe": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "4.0"
}
],
"cpe": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.5"
},
{
"last_affected": "2.6"
}
],
"cpe": [
"cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD"
}