Lucene search

K
githubGitHub Advisory DatabaseGHSA-6J58-GRHV-2769
HistoryAug 25, 2022 - 12:00 a.m.

ansible-runner vulnerable to shell command injection

2022-08-2500:00:27
CWE-20
CWE-116
GitHub Advisory Database
github.com
14
ansible-runner
vulnerability
shell command

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

32.2%

A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host’s shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment.

Affected configurations

Vulners
Node
redhatansible_runnerRange<2.1.0
VendorProductVersionCPE
redhatansible_runner*cpe:2.3:a:redhat:ansible_runner:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

32.2%