GSD-2019-10156
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-10156",
"description": "A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.",
"id": "GSD-2019-10156",
"references": [
"https://www.suse.com/security/cve/CVE-2019-10156.html",
"https://www.debian.org/security/2021/dsa-4950",
"https://access.redhat.com/errata/RHSA-2019:3789",
"https://access.redhat.com/errata/RHSA-2019:3744",
"https://access.redhat.com/errata/RHSA-2019:1708",
"https://access.redhat.com/errata/RHSA-2019:1707",
"https://access.redhat.com/errata/RHSA-2019:1706",
"https://access.redhat.com/errata/RHSA-2019:1705",
"https://ubuntu.com/security/CVE-2019-10156",
"https://advisories.mageia.org/CVE-2019-10156.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-10156"
],
"details": "A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.",
"id": "GSD-2019-10156",
"modified": "2023-12-13T01:23:59.609108Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-10156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ansible",
"version": {
"version_data": [
{
"version_value": "fixed in 2.6.18"
},
{
"version_value": "fixed in 2.7.12"
},
{
"version_value": "fixed in 2.8.2"
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156"
},
{
"name": "https://github.com/ansible/ansible/pull/57188",
"refsource": "CONFIRM",
"url": "https://github.com/ansible/ansible/pull/57188"
},
{
"name": "[debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html"
},
{
"name": "RHSA-2019:3744",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"name": "RHSA-2019:3789",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"name": "[debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html"
},
{
"name": "DSA-4950",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4950"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c2.6.18||\u003e=2.7.0,\u003c2.7.12||\u003e=2.8.0,\u003c2.8.2",
"affected_versions": "All versions before 2.6.18, all versions starting from 2.7.0 before 2.7.12, all versions starting from 2.8.0 before 2.8.2",
"cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2019-09-16",
"description": "A flaw was discovered in the way Ansible templating was implemented causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.",
"fixed_versions": [
"2.6.18",
"2.7.12",
"2.8.2"
],
"identifier": "CVE-2019-10156",
"identifiers": [
"CVE-2019-10156"
],
"not_impacted": "All versions starting from 2.6.18 before 2.7.0, all versions starting from 2.7.12 before 2.8.0, all versions starting from 2.8.2",
"package_slug": "pypi/ansible",
"pubdate": "2019-07-30",
"solution": "Upgrade to versions 2.6.18, 2.7.12, 2.8.2 or above.",
"title": "Information Exposure",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156"
],
"uuid": "dfdabc53-3e3c-49d5-a121-a1027ea54290"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6.18",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.7.12",
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.8.2",
"versionStartIncluding": "2.8.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-10156"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156"
},
{
"name": "https://github.com/ansible/ansible/pull/57188",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ansible/ansible/pull/57188"
},
{
"name": "[debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update",
"refsource": "MLIST",
"tags": [
"Vendor Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html"
},
{
"name": "RHSA-2019:3744",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"name": "RHSA-2019:3789",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"name": "[debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html"
},
{
"name": "DSA-4950",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4950"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
},
"lastModifiedDate": "2022-04-19T15:36Z",
"publishedDate": "2019-07-30T23:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…