CVE-2020-1734
Ansible Tower vulnerability analysis and mitigation

Overview

A flaw was discovered in the pipe lookup plugin of Ansible (CVE-2020-1734), reported in November 2019. The vulnerability exists when the pipe lookup plugin uses subprocess.Popen() with shell=True, allowing arbitrary commands to be executed by overwriting Ansible facts when variables are not properly escaped by the quote plugin (NVD, CVE).

Technical details

The vulnerability stems from the pipe lookup plugin's default configuration where subprocess.Popen() is executed with shell=True. When variables are passed to the pipe lookup and are not properly escaped using the quote plugin, they can be overwritten via Ansible facts, leading to potential arbitrary code execution. The vulnerability has a CVSS v3.1 base score of 7.4 (HIGH) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L (NVD).

Impact

An attacker could potentially execute arbitrary commands by overwriting Ansible facts, leading to unauthorized command execution in the context of the Ansible execution environment. This could result in system compromise through privilege escalation (Bugzilla).

Mitigation and workarounds

The issue can be mitigated by ensuring all variables used in the pipe lookup are properly escaped. The suggested fix involves using shell=False by default and adding an argument to explicitly enable shell=True when needed (Bugzilla).

Community reactions

Upstream Ansible developers acknowledged this as intended functionality and delegated the responsibility to playbook authors to ensure proper use of the quote filter. The issue was previously reported in GitHub issue #6550 but was not fixed due to concerns about breaking existing functionality (GitHub).

Additional resources


SourceThis report was generated using AI

Related Ansible Tower vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-4112HIGH8.8
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesAug 25, 2022
CVE-2021-3583HIGH7.1
  • Ansible TowerAnsible Tower
  • ansible
NoYesSep 22, 2021
CVE-2020-14327MEDIUM5.5
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021
CVE-2020-14329LOW3.3
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021
CVE-2020-14328LOW3.3
  • Ansible TowerAnsible Tower
  • cpe:2.3:a:redhat:ansible_tower
NoYesMay 27, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management