From e86b75e7ea72f44931625373940a1f4b0e323c3d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 3 Dec 2024 22:04:27 +0000 Subject: [PATCH] Publish GHSA-99w6-3xph-cx78 --- .../GHSA-99w6-3xph-cx78.json | 73 +++++++++++++++++-- 1 file changed, 66 insertions(+), 7 deletions(-) diff --git a/advisories/github-reviewed/2024/11/GHSA-99w6-3xph-cx78/GHSA-99w6-3xph-cx78.json b/advisories/github-reviewed/2024/11/GHSA-99w6-3xph-cx78/GHSA-99w6-3xph-cx78.json index 282aed8a819f3..fb629d1eeae70 100644 --- a/advisories/github-reviewed/2024/11/GHSA-99w6-3xph-cx78/GHSA-99w6-3xph-cx78.json +++ b/advisories/github-reviewed/2024/11/GHSA-99w6-3xph-cx78/GHSA-99w6-3xph-cx78.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-99w6-3xph-cx78", - "modified": "2024-11-12T21:35:38Z", + "modified": "2024-12-03T22:02:07Z", "published": "2024-11-12T00:30:36Z", "aliases": [ "CVE-2024-11079" @@ -9,12 +9,54 @@ "summary": "Ansible-Core vulnerable to content protections bypass", "details": "A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" + }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P" } ], "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "ansible-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.18.0b1" + }, + { + "fixed": "2.18.1rc1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "PyPI", + "name": "ansible-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.17.0b1" + }, + { + "fixed": "2.17.7rc1" + } + ] + } + ] + }, { "package": { "ecosystem": "PyPI", @@ -28,14 +70,11 @@ "introduced": "0" }, { - "fixed": "2.18.1" + "fixed": "2.16.14rc1" } ] } - ], - "database_specific": { - "last_known_affected_version_range": "<= 2.18.0" - } + ] } ], "references": [ @@ -47,6 +86,22 @@ "type": "WEB", "url": "https://github.com/ansible/ansible/pull/84299" }, + { + "type": "WEB", + "url": "https://github.com/ansible/ansible/pull/84339" + }, + { + "type": "WEB", + "url": "https://github.com/ansible/ansible/commit/2936b80dbbc7efb889934aeec80f6142c10266ce" + }, + { + "type": "WEB", + "url": "https://github.com/ansible/ansible/commit/70e83e72b43e05e57eb42a6d52d01a4d9768f510" + }, + { + "type": "WEB", + "url": "https://github.com/ansible/ansible/commit/98774d15d7748ebaaaf2e83942cc7e8d39f7280e" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-11079" @@ -58,6 +113,10 @@ { "type": "PACKAGE", "url": "https://github.com/ansible/ansible" + }, + { + "type": "WEB", + "url": "https://github.com/ansible/ansible/blob/v2.18.1/changelogs/CHANGELOG-v2.18.rst#security-fixes" } ], "database_specific": {