⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
CVE-2017-7481
Severity
9.8CRITICAL
EPSS
3.5%
top 12.38%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJul 19
Latest updateJul 24
Description
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages10 packages
Also affects: Debian Linux 9.0, Ubuntu Linux 16.04, 18.04, 19.04, Openshift Container Platform 3.3, 3.4, 3.5
Patches
🔴Vulnerability Details
5📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2017-7481 ansible: Security issue with lookup return not tainting the jinja2 environment [epel-all]↗2017-05-12
Bugzilla▶
CVE-2017-7481 ansible: Security issue with lookup return not tainting the jinja2 environment [fedora-all]↗2017-05-12
Bugzilla▶
CVE-2017-7481 ansible: Security issue with lookup return not tainting the jinja2 environment↗2017-05-11