Bug 2325171 (CVE-2024-11079) - CVE-2024-11079 ansible-core: Unsafe Tagging Bypass via hostvars Object in Ansible-Core [NEEDINFO]
Summary: CVE-2024-11079 ansible-core: Unsafe Tagging Bypass via hostvars Object in Ans...
Keywords:
Status: NEW
Alias: CVE-2024-11079
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2325174 2325173
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-11 12:01 UTC by OSIDB Bzimport
Modified: 2025-05-15 08:28 UTC (History)
38 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
mdogra: needinfo? (prodsec-dev)


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:10770 0 None None None 2024-12-03 22:39:53 UTC
Red Hat Product Errata RHSA-2024:11145 0 None None None 2024-12-16 18:52:59 UTC

Description OSIDB Bzimport 2024-11-11 12:01:25 UTC
Unsafe tagging can be bypassed by using the `hostvars` object to
indirectly reference the content and successfully template it

Requirements to exploit (if any):
Access to mangle the content returned to a play (via lookup or
module) that uses hostvars to reference the unsafe content.

Steps to reproduce :
     - have unsafe content from lookup or module, or defined:
            untrusted: !unsafe this{{varshould}}notbetemplated
    - reference it via the hostvars object
       debug: msg={{ hostvars['hostname']['untrusted']

Comment 1 Abhishek Raj 2024-11-11 12:03:40 UTC
The vulnerability has a low impact on confidentiality, as data exposure depends on the play's logic. It poses a moderate risk to integrity and availability due to potential tampering with execution flows and the termination of critical processes through injected commands. Exploitation is of high complexity, requiring specific knowledge of the playbook and access to modify remote data or perform MITM attacks. However, the scope of impact extends to remote systems, potentially altering their behavior.

Comment 5 errata-xmlrpc 2024-12-03 22:39:50 UTC
This issue has been addressed in the following products:

  Ansible Automation Platform Execution Environments

Via RHSA-2024:10770 https://access.redhat.com/errata/RHSA-2024:10770

Comment 6 errata-xmlrpc 2024-12-16 18:52:56 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.5 for RHEL 8
  Red Hat Ansible Automation Platform 2.5 for RHEL 9

Via RHSA-2024:11145 https://access.redhat.com/errata/RHSA-2024:11145


Note You need to log in before you can comment on or make changes to this bug.