VYPR

rpm package

suse/ansible&distro=SUSE Package Hub 12

pkg:rpm/suse/ansible&distro=SUSE%20Package%20Hub%2012

Vulnerabilities (10)

  • CVE-2019-3828Mar 27, 2019
    affected < 2.7.8-bp150.3.6.1fixed 2.7.8-bp150.3.6.1

    Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.

  • CVE-2018-16876Jan 3, 2019
    affected < 2.7.8-bp150.3.6.1fixed 2.7.8-bp150.3.6.1

    ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.

  • CVE-2018-16859Nov 29, 2018
    affected < 2.7.8-bp150.3.6.1fixed 2.7.8-bp150.3.6.1

    Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the

  • CVE-2018-16837Oct 23, 2018
    affected < 2.7.8-bp150.3.6.1fixed 2.7.8-bp150.3.6.1

    Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which h

  • CVE-2016-8614Jul 31, 2018
    affected < 2.4.1.0-6.1fixed 2.4.1.0-6.1

    A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

  • CVE-2016-8628Jul 31, 2018
    affected < 2.4.1.0-6.1fixed 2.4.1.0-6.1

    Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.

  • CVE-2017-7481Jul 19, 2018
    affected < 2.4.1.0-6.1fixed 2.4.1.0-6.1

    Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default,

  • CVE-2018-10875Jul 13, 2018
    affected < 2.7.8-bp150.3.6.1fixed 2.7.8-bp150.3.6.1

    A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.

  • CVE-2016-9587Apr 24, 2018
    affected < 2.4.1.0-6.1fixed 2.4.1.0-6.1

    Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use thi

  • CVE-2017-7550CriNov 21, 2017
    affected < 2.4.1.0-6.1fixed 2.4.1.0-6.1

    A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords t