
Cloud Vulnerability DB
A community-led vulnerabilities database
Ansible before version 1.6.7 contains multiple security vulnerabilities identified as CVE-2014-4966. The vulnerability allows remote attackers to execute arbitrary code through inventory data containing '{{' and 'lookup' substrings, and remote data with '{{' substrings. This vulnerability specifically affects the way Ansible handles data processing and input validation (OCERT Advisory).
The vulnerability involves two main issues: First, the escalation of local permission access level into arbitrary code execution, which can be triggered by interpolation of file names maliciously crafted as lookup plugin commands in combination with its pipe feature. Second, unsafe parsing of action arguments when an attacker controls variable data (including fact data, with_fileglob data, or other sources), allowing attackers to supply their own options to an action. The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
The impact of this vulnerability is severe as it allows attackers to execute arbitrary code. For specific actions like copy or template, attackers controlling variables could trigger arbitrary code execution in addition to information leakage via the validate option's acceptance of arbitrary shell code (OCERT Advisory).
The primary mitigation is to upgrade Ansible to version 1.6.7 or later. The fix includes stripping lookup calls out of inventory variables, cleaning unsafe data returned from lookup plugins, and ensuring variables don't insert extra parameters into module args (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."