3 results (0.007 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality. Se encontró un fallo de condición de carrera en ansible-runner, donde un atacante podría observar la creación y eliminación rápida de un directorio temporal, sustituir su directorio por ese nombre, y luego tener acceso al private_data_dir de ansible-runner la próxima vez que ansible-runner hiciera uso del private_data_dir. La mayor amenaza de este fallo es para la integridad y la confidencialidad. • https://access.redhat.com/security/cve/CVE-2021-3702 https://bugzilla.redhat.com/show_bug.cgi?id=1977965 https://github.com/ansible/ansible-runner/pull/742/commits • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 0

A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity. Se ha encontrado un fallo en ansible-runner en el que la configuración de archivos temporales por defecto en ansible versión 2.0.0, es escrito en ubicaciones R/W del mundo. Este fallo permite a un atacante precrear el directorio, resultando en una lectura de información privada o forzando a ansible-runner a escribir archivos como el usuario legítimo en un lugar que no esperaba. • https://access.redhat.com/security/cve/CVE-2021-3701 https://bugzilla.redhat.com/show_bug.cgi?id=1977959 https://github.com/ansible/ansible-runner/issues/738 https://github.com/ansible/ansible-runner/pull/742/commits • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment. Se ha encontrado un fallo en ansible-runner. Un escape inapropiado del comando shell, mientras es llamado a ansible_runner.interface.run_command, puede conllevar a que los parámetros sean ejecutados como el comando shell del host. • https://access.redhat.com/security/cve/CVE-2021-4041 https://bugzilla.redhat.com/show_bug.cgi?id=2028074 https://github.com/ansible/ansible-runner/commit/3533f265f4349a3f2a0283158cd01b59a6bbc7bd • CWE-20: Improper Input Validation CWE-116: Improper Encoding or Escaping of Output •