CVE-2020-1734

Published Mar 3, 2020

Last updated 2 years ago

Overview

Description
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
Source
secalert@redhat.com
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
7.4
Impact score
6
Exploitability score
0.8
Vector string
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
3.7
Impact score
6.4
Exploitability score
1.9
Vector string
AV:L/AC:H/Au:N/C:P/I:P/A:P

Weaknesses

secalert@redhat.com
CWE-78
nvd@nist.gov
CWE-78

Configurations