CVE-2014-4967
Ansible vulnerability analysis and mitigation

Overview

Multiple argument injection vulnerabilities were discovered in Ansible before version 1.6.7. The vulnerability (CVE-2014-4967) allows remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact. The exploitation can be achieved through facts with trailing clauses like 'src=', 'temp=', or 'validate=' accompanied by a shell command (NIST NVD, oCERT Advisory).

Technical details

The vulnerability stems from input sanitization errors in the Ansible platform that allow arbitrary code execution when an attacker controls certain playbook variables. The issue specifically involves unsafe parsing of action arguments when variable data (including fact data, with_fileglob data, or other sources) is controlled by an attacker. The impact varies depending on the action module targeted, with copy or template actions being particularly vulnerable to arbitrary code execution through the validate option's acceptance of arbitrary shell code (oCERT Advisory).

Impact

The vulnerability allows remote attackers to execute arbitrary code on systems where they have access to an Ansible managed host. This can lead to complete system compromise, as attackers can inject malicious commands through crafted facts. The CVSS v3.1 base score is 9.8 (Critical), indicating the severe potential impact on system confidentiality, integrity, and availability (NIST NVD).

Mitigation and workarounds

The vulnerability was fixed in Ansible version 1.6.7. The fix includes improvements to input sanitization and proper handling of action arguments. Organizations should upgrade to Ansible version 1.6.7 or later to address this vulnerability (Ansible Patch).

Additional resources


SourceThis report was generated using AI

Related Ansible vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-1313MEDIUM6.5
  • GrafanaGrafana
  • grafana-pcp
NoYesMar 26, 2024
CVE-2024-9902MEDIUM6.3
  • AnsibleAnsible
  • ansible-test
NoYesNov 06, 2024
CVE-2025-14010MEDIUM5.5
  • AnsibleAnsible
  • ansible
NoYesDec 04, 2025
CVE-2024-11079MEDIUM5.5
  • AnsibleAnsible
  • ansible-test
NoYesNov 12, 2024
CVE-2024-8775MEDIUM5.5
  • AnsibleAnsible
  • ansible-doc
NoYesSep 14, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management