In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041396 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHBA-2018:3788 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2150 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2151 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2152 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2166 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2321 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2585 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0054 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10874 | Issue Tracking Vendor Advisory |
https://usn.ubuntu.com/4072-1/ |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-07-02 13:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-10874
Mitre link : CVE-2018-10874
CVE.ORG link : CVE-2018-10874
JSON object : View
Products Affected
redhat
- virtualization
- virtualization_host
- openstack
- ansible_engine