A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
| Software | From | Fixed in |
|---|---|---|
| redhat / ansible_tower | 3.4.5 | 3.4.5.x |
| redhat / ansible_tower | 3.5.5 | 3.5.5.x |
| redhat / ansible_tower | 3.6.3 | 3.6.3.x |
| redhat / ansible_engine | 2.8.8 | 2.8.8.x |
| redhat / ansible_engine | 2.9.5 | 2.9.5.x |
| redhat / ansible_engine | - | 2.7.16.x |
| redhat / ansible_tower | - | 3.3.4.x |
ansible
|
- | 2.10.x |