{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-10684","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-04T11:06:10.659Z","dateReserved":"2020-03-20T00:00:00.000Z","datePublished":"2020-03-24T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-10-07T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection."}],"affected":[{"vendor":"Red Hat","product":"Ansible","versions":[{"version":"all Ansible 2.7.x versions prior to 2.7.17","status":"affected"},{"version":"all Ansible 2.8.x versions prior to 2.8.9","status":"affected"},{"version":"all Ansible 2.9.x versions prior to 2.9.6","status":"affected"}]}],"references":[{"name":"FEDORA-2020-1b6ce91e37","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/"},{"name":"FEDORA-2020-3990f03ba3","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/"},{"name":"FEDORA-2020-f80154b5b4","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/"},{"name":"GLSA-202006-11","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202006-11"},{"name":"DSA-4950","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2021/dsa-4950"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.9,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-94","cweId":"CWE-94"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-862","cweId":"CWE-862"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-362","cweId":"CWE-362"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T11:06:10.659Z"},"title":"CVE Program Container","references":[{"name":"FEDORA-2020-1b6ce91e37","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/"},{"name":"FEDORA-2020-3990f03ba3","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/"},{"name":"FEDORA-2020-f80154b5b4","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/"},{"name":"GLSA-202006-11","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202006-11"},{"name":"DSA-4950","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2021/dsa-4950"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684","tags":["x_transferred"]}]}]}}