CVE-2024-11079: Ansible-Core vulnerable to content protections bypass
(updated )
A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.
References
- access.redhat.com/errata/RHSA-2024:10770
- access.redhat.com/errata/RHSA-2024:11145
- access.redhat.com/security/cve/CVE-2024-11079
- bugzilla.redhat.com/show_bug.cgi?id=2325171
- github.com/advisories/GHSA-99w6-3xph-cx78
- github.com/ansible/ansible
- github.com/ansible/ansible/blob/v2.18.1/changelogs/CHANGELOG-v2.18.rst
- github.com/ansible/ansible/commit/2936b80dbbc7efb889934aeec80f6142c10266ce
- github.com/ansible/ansible/commit/70e83e72b43e05e57eb42a6d52d01a4d9768f510
- github.com/ansible/ansible/commit/98774d15d7748ebaaaf2e83942cc7e8d39f7280e
- github.com/ansible/ansible/pull/84299
- github.com/ansible/ansible/pull/84339
- nvd.nist.gov/vuln/detail/CVE-2024-11079
Detect and mitigate CVE-2024-11079 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →