Bug 1596533 (CVE-2018-10875)

Summary: CVE-2018-10875 ansible: ansible.cfg is being read from current working directory allowing possible code execution
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: a.badger, abhgupta, ahardin, aos-bugs, apevec, athmanem, bbuckingham, bcourt, bkearney, bleanhar, bmcclain, ccoleman, chrisw, cpelland, cshereme, dajohnso, dbaker, dbecker, dblechte, dedgar, dfediuck, dmetzger, dominik.mierzejewski, eedri, eparis, gblomqui, gmccullo, gtanzill, jcammara, jfrey, jgoulding, jhardy, jjoyce, jmatthew, jokerman, jprause, jschluet, jupierce, kbasil, kdixon, kdube, kevin, lhh, lpeer, markmc, maxim, mburns, mchappel, mgoldboi, michal.skrivanek, mmccomas, mmccune, mrike, obarenbo, ohadlevy, pcahyna, rbryant, rchan, rhos-maint, rjerrido, roliveri, sbonazzo, sclewis, security-response-team, sherold, simaishi, sisharma, slinaber, smallamp, smunilla, ssaha, sthangav, tcarlin, tdecacqu, tkuratom, trankin, tsanders, tvignaud, vbellur
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ansible 2.4.6, ansible 2.5.6, ansible 2.6.1 Doc Type: If docs needed, set a value
Doc Text:
It was found that ansible.cfg is being read from the current working directory, which can be made to point to plugin or module paths that are under control of the attacker. This could allow an attacker to execute arbitrary code.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:30:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1598803, 1598804, 1598805, 1598806, 1598813, 1598814, 1599297, 1602764, 1602765, 1602766, 1602767, 1607722, 1611793, 1611794, 1611795, 1636193, 1636195    
Bug Blocks: 1596534    

Description Adam Mariš 2018-06-29 08:03:46 UTC
It was found that ansible.cfg is being read from current working directory, which cam be made to point to plugin or module paths that are under control of the attacker, allowing to execute arbitrary code.

Comment 1 Borja Tarraso 2018-06-29 14:13:20 UTC
Acknowledgments:

Name: Brian Coca (Red Hat)

Comment 2 Pavel Cahyna 2018-06-29 14:16:52 UTC
s/cam/can/

Comment 3 Borja Tarraso 2018-07-06 13:51:29 UTC
Created ansible tracking bugs for this issue:

Affects: epel-all [bug 1598806]
Affects: fedora-all [bug 1598805]

Comment 7 errata-xmlrpc 2018-07-10 09:48:50 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Engine 2.5 for RHEL 7

Via RHSA-2018:2150 https://access.redhat.com/errata/RHSA-2018:2150

Comment 8 errata-xmlrpc 2018-07-10 11:32:41 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Engine 2 for RHEL 7

Via RHSA-2018:2151 https://access.redhat.com/errata/RHSA-2018:2151

Comment 9 errata-xmlrpc 2018-07-10 12:56:12 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Engine 2.4 for RHEL 7

Via RHSA-2018:2152 https://access.redhat.com/errata/RHSA-2018:2152

Comment 10 errata-xmlrpc 2018-07-10 17:20:01 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Engine 2.6 for RHEL 7

Via RHSA-2018:2166 https://access.redhat.com/errata/RHSA-2018:2166

Comment 13 errata-xmlrpc 2018-07-31 17:49:33 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Via RHSA-2018:2321 https://access.redhat.com/errata/RHSA-2018:2321

Comment 14 Borja Tarraso 2018-08-02 08:01:55 UTC
Upstream patch: https://github.com/ansible/ansible/pull/42070

Comment 19 errata-xmlrpc 2018-08-29 16:05:03 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 13.0 (Queens)

Via RHSA-2018:2585 https://access.redhat.com/errata/RHSA-2018:2585

Comment 24 errata-xmlrpc 2019-01-16 17:10:04 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2019:0054 https://access.redhat.com/errata/RHSA-2019:0054

Comment 25 Hardik Vyas 2020-12-04 15:33:01 UTC
Statement:

Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 ships the affected version of ansible, but they no longer maintain their own version of ansible. Both the products will consume fixes directly from ansible repository.