When installing a maliciously created Ansible role using `ansible-galaxy role install`, arbitrary files the user has access to can be overwritten. The malicious role must contain a symlink with an absolute path to the target file, followed by a file of the same name (as the symlink) with the contents to write to the target.
Could you please provide the version number where this is fixed in ansible or a link to a fixing commit? Or is this still unfixed upstream? Thanks a lot!
This was reported internally, I'm not sure there are any upstream references. Tagging vinair to elaborate further.
heya,there you go https://github.com/ansible/ansible/pull/81780.
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.3 for RHEL 8 Red Hat Ansible Automation Platform 2.3 for RHEL 9 Via RHSA-2023:5701 https://access.redhat.com/errata/RHSA-2023:5701
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.4 for RHEL 9 Red Hat Ansible Automation Platform 2.4 for RHEL 8 Via RHSA-2023:5758 https://access.redhat.com/errata/RHSA-2023:5758