CVE-2020-1738

NameCVE-2020-1738
DescriptionA flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ansible (PTS)jessie, jessie (lts)1.7.2+dfsg-2+deb8u3vulnerable
stretch (security), stretch (lts), stretch2.2.1.0-2+deb9u3vulnerable
buster (security), buster, buster (lts)2.7.7+dfsg-1+deb10u2vulnerable
bullseye2.10.7+merged+base+2.10.17+dfsg-0+deb11u1vulnerable
bullseye (security)2.10.7+merged+base+2.10.17+dfsg-0+deb11u2vulnerable
bookworm7.7.0+dfsg-3+deb12u1vulnerable
sid, trixie11.1.0+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ansiblesource(unstable)(unfixed)unimportant

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=1802164
https://github.com/ansible/ansible/issues/67796
Marked unimportant as for exploitation it requires already a remote that is
compromised, cf. https://github.com/ansible/ansible/issues/67796#issuecomment-614656017

Search for package or bug name: Reporting problems