CVE-2020-1734
Published Mar 3, 2020
Last updated 2 years ago
Overview
- Description
- A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 6
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 3.7
- Impact score
- 6.4
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E713A0F-6AD3-409E-87AA-DE7EB5B7525C", "versionEndIncluding": "2.7.16" }, { "criteria": "cpe:2.3:a:redhat:ansible_engine:2.8.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDC2F2BC-209D-4FA4-B1E1-E486DE8AC48B" }, { "criteria": "cpe:2.3:a:redhat:ansible_engine:2.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8599992B-8847-4332-80CC-F98FA4125272" }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndIncluding": "3.3.4" }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16776B7F-83E9-4918-94D8-60CA0F96F870" }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FE9389E-3129-4A14-96CA-5113BD09AD10" }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E695D048-7109-4840-8DE1-59AC1690E667" } ], "operator": "OR" } ] } ]