HIGH · 7.8

CVE-2018-10875

A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing t...

Vulnerability Description

A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
RedhatAnsible Engine2.0
RedhatCeph Storage2.0
RedhatGluster Storage3.0.0
RedhatOpenshift3.0
RedhatOpenstack10
RedhatVirtualization4.0
RedhatVirtualization Host4.0
DebianDebian Linux9.0
SusePackage Hub-
SuseSuse Linux Enterprise Server12
CanonicalUbuntu Linux16.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-10875?

CVE-2018-10875 is a vulnerability with a CVSS score of 7.8 (HIGH). A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing t...

How severe is CVE-2018-10875?

CVE-2018-10875 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-10875?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ansible Engine, Redhat Ceph Storage, Redhat Gluster Storage, Redhat Openshift, Redhat Openstack.