CVE-2019-14904 – ansible
Package
Manager: pip
Name: ansible
Vulnerable Version: >=0 <2.7.16 || >=2.8.0a1 <2.8.8 || >=2.9.0a1 <2.9.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
EPSS: 0.00041 pctl0.11634
Details
OS Command Injection and Improper Input Validation in ansible A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
Metadata
Created: 2021-04-20T16:44:22Z
Modified: 2024-09-06T20:14:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-gwr8-5j83-483c/GHSA-gwr8-5j83-483c.json
CWE IDs: ["CWE-20", "CWE-78"]
Alternative ID: GHSA-gwr8-5j83-483c
Finding: F404
Auto approve: 1