Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-5115
HistoryDec 18, 2023 - 12:00 a.m.

CVE-2023-5115

2023-12-1800:00:00
ubuntu.com
ubuntu.com
6
cve-2023-5115
ansible automation platform
path traversal
attacker
malicious role
symlink
overwrite
bugzilla
sbeattie
ansible-core
unix

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

6.3 Medium

AI Score

Confidence

High

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

28.6%

An absolute path traversal attack exists in the Ansible automation
platform. This flaw allows an attacker to craft a malicious Ansible role
and make the victim execute the role. A symlink can be used to overwrite a
file outside of the extraction path.

Bugs

Notes

Author Note
sbeattie core ansible binaries were split into ansible-base, which got renamed to ansible-core

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

6.3 Medium

AI Score

Confidence

High

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

28.6%