[v3.0] ansible: input sanitization errors (CVE-2014-4966 CVE-2014-4967)
The Ansible project is an open source configuration management platform.
The Ansible platform suffers from input sanitization errors that allow
arbitrary code execution as well as information leak, in case an attacker is
able to control certain playbook variables.
The first vulnerability involves the escalation of a local permission
level into arbitrary code execution. The code execution can be triggered by
interpolation of file names maliciously crafted as lookup plugin commands, in
combination with its pipe feature.
The second vulnerability concerns the unsafe parsing of action arguments
the face of an attacker controlling variable data (whether fact data,
with_fileglob data, or other sources), allowing an attacker to supply their
own options to an action. The impact of this is dependent on the action
module the attacker targets. For example, an attacker controlling variables
passed to the copy or template actions would be able to trigger arbitrary
code execution (in addition to simple information leakage) via the validate
option’s acceptance of arbitrary shell code.
Ansible <= 1.6.6
Ansible >= 1.6.7
Credit: vulnerability report received from Brian Harring <ferringb
CVE: CVE-2014-4966 (lookup function), CVE-2014-4967 (action arguments)
(from redmine: issue id 3249, created on 2014-07-29, closed on 2014-07-30)
- parent #3247 (closed)
- Revision 353f4d22 by Natanael Copa on 2014-07-29T14:04:50Z:
main/ansible: security upgrade to 1.6.7 (CVE-2014-4966,CVE-2014-4967) fixes #3249