A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "2.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "2.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:ansible_engine:2.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "2.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "3.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "3.0.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:gluster_storage:3.0.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "3.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "10"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "12"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "13"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "4.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "4.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "16.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "19.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "9.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.5"
},
{
"last_affected": "2.6"
}
],
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*"
]
}