Command injection in Ansible Vault - CVE-2017-2809
Published: September 15, 2017
Vulnerability identifier: #VU8446
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-2809
CWE-ID: CWE-77
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vendor: Python.org
Affected software:
Ansible Vault
Ansible Vault
Detailed vulnerability description
The vulnerability allows an adjacent attacker to execute arbitrary commands on the target system.
The weakness exists in the yaml loading functionality due to improper processing of Yet Another Markup Language (YAML) content. An adjacent attacker can submit a specially crafted vault containing embedded Python code, and execute arbitrary commands.
Successful exploitation of the vulnerability results in code execution and system compromise.
The weakness exists in the yaml loading functionality due to improper processing of Yet Another Markup Language (YAML) content. An adjacent attacker can submit a specially crafted vault containing embedded Python code, and execute arbitrary commands.
Successful exploitation of the vulnerability results in code execution and system compromise.