Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-11079— Ansible-core: unsafe tagging bypass via hostvars object in ansible-core

CVSS 5.5 · Medium EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-11079

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Ansible-core: unsafe tagging bypass via hostvars object in ansible-core
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Ansible 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Ansible是美国红帽(Red Hat)公司的一款计算机系统配置管理器。该产品可用于发布、管理和编排计算机系统。 Red Hat Ansible存在输入验证错误漏洞,该漏洞源于使用 hostvars 对象来引用和执行模板内容,从而绕过不安全的内容保护。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatAnsible Automation Platform Execution Environments 3.0.1-107 ~ * cpe:/a:redhat:ansible_core:2::el8
Red HatAnsible Automation Platform Execution Environments 3.0.1-108 ~ * cpe:/a:redhat:ansible_core:2::el8
Red HatAnsible Automation Platform Execution Environments 2.9.27-34 ~ * cpe:/a:redhat:ansible_core:2::el8
Red HatAnsible Automation Platform Execution Environments 2.17.7-1 ~ * cpe:/a:redhat:ansible_core:2::el8
Red HatAnsible Automation Platform Execution Environments 2.16.14-2 ~ * cpe:/a:redhat:ansible_core:2::el8
Red HatRed Hat Ansible Automation Platform 2.5 for RHEL 8 1:2.16.14-1.el8ap ~ * cpe:/a:redhat:ansible_automation_platform:2.5::el9
Red HatRed Hat Ansible Automation Platform 2.5 for RHEL 9 1:2.16.14-1.el9ap ~ * cpe:/a:redhat:ansible_automation_platform:2.5::el9
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux AI (RHEL AI)-cpe:/a:redhat:enterprise_linux_ai:1
Red HatRed Hat Enterprise Linux AI (RHEL AI)-cpe:/a:redhat:enterprise_linux_ai:1

II. Public POCs for CVE-2024-11079

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-11079

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-11079

No comments yet


Leave a comment