{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-3828","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-04T19:19:18.580Z","dateReserved":"2019-01-03T00:00:00.000Z","datePublished":"2019-03-27T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-06-12T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path."}],"affected":[{"vendor":"Red Hat","product":"Ansible","versions":[{"version":"2.5.15","status":"affected"},{"version":"2.6.14","status":"affected"},{"version":"2.7.8","status":"affected"}]}],"references":[{"url":"https://github.com/ansible/ansible/pull/52133"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"},{"name":"openSUSE-SU-2019:1125","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"},{"name":"openSUSE-SU-2019:1635","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"},{"name":"USN-4072-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/4072-1/"},{"name":"openSUSE-SU-2019:1858","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"},{"name":"RHSA-2019:3744","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2019:3744"},{"name":"RHSA-2019:3789","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2019:3789"},{"url":"http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.2,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-22","cweId":"CWE-22"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T19:19:18.580Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/ansible/ansible/pull/52133","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828","tags":["x_transferred"]},{"name":"openSUSE-SU-2019:1125","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"},{"name":"openSUSE-SU-2019:1635","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"},{"name":"USN-4072-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/4072-1/"},{"name":"openSUSE-SU-2019:1858","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"},{"name":"RHSA-2019:3744","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:3744"},{"name":"RHSA-2019:3789","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:3789"},{"url":"http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html","tags":["x_transferred"]}]}]}}