The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.
References
Link | Resource |
---|---|
https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md | Release Notes |
https://www.securityfocus.com/bid/68232 | Third Party Advisory VDB Entry |
https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md | Release Notes |
https://www.securityfocus.com/bid/68232 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md - Release Notes | |
References | () https://www.securityfocus.com/bid/68232 - Third Party Advisory, VDB Entry |
Information
Published : 2020-02-20 15:15
Updated : 2024-11-21 02:10
NVD link : CVE-2014-4657
Mitre link : CVE-2014-4657
CVE.ORG link : CVE-2014-4657
JSON object : View
Products Affected
redhat
- ansible
CWE
CWE-20
Improper Input Validation