In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10874 | Issue Tracking Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2166 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2152 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2151 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2150 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2321 | Vendor Advisory |
http://www.securitytracker.com/id/1041396 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:2585 | Vendor Advisory |
https://access.redhat.com/errata/RHBA-2018:3788 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0054 | Vendor Advisory |
https://usn.ubuntu.com/4072-1/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-07-02 06:29
Updated : 2023-02-12 20:51
NVD link : CVE-2018-10874
Mitre link : CVE-2018-10874
JSON object : View
CWE
CWE-426
Untrusted Search Path
Products Affected
redhat
- virtualization
- virtualization_host
- ansible_engine
- openstack