CRITICAL · 9.8

CVE-2017-7481

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be ...

Vulnerability Description

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
RedhatOpenshift Container Platform3.3
RedhatOpenstack10
RedhatStorage Console2.0
RedhatVirtualization4.1
RedhatVirtualization Manager4.1
RedhatGluster Storage3.2
RedhatEnterprise Linux7.0
RedhatAnsible Engine< 2.3.1.0
CanonicalUbuntu Linux16.04
DebianDebian Linux9.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-7481?

CVE-2017-7481 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be ...

How severe is CVE-2017-7481?

CVE-2017-7481 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2017-7481?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift Container Platform, Redhat Openstack, Redhat Storage Console, Redhat Virtualization, Redhat Virtualization Manager.