A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| ansible(PyPI) | 2.10.0a1 | 2.10.0rc1 | N/A |
| ansible(PyPI) | 2.9.0a1 | 2.9.11 | N/A |
| ansible(PyPI) | 0 | 2.8.13 | N/A |
CVSS Metrics