Vulnerability Details : CVE-2016-3096
The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.
Products affected by CVE-2016-3096
- cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ansible:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ansible:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3096
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3096
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-3096
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3096
-
https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig
Sign in - Google Accounts
-
https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4
do not use a predictable filenames in the LXC plugin by evgeni · Pull Request #1941 · ansible/ansible-modules-extras · GitHubPatch
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html
[SECURITY] Fedora 22 Update: ansible-2.0.2.0-1.fc22Vendor Advisory
-
https://github.com/ansible/ansible-modules-extras/pull/1941
do not use a predictable filenames in the LXC plugin by evgeni · Pull Request #1941 · ansible/ansible-modules-extras · GitHubPatch
-
https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0
Sign in - Google Accounts
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html
[SECURITY] Fedora 23 Update: ansible-2.0.2.0-1.fc23Vendor Advisory
-
https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd
ansible/CHANGELOG.md at v1.9.6-1 · ansible/ansible · GitHubThird Party Advisory
-
https://security.gentoo.org/glsa/201607-14
Ansible: Privilege escalation (GLSA 201607-14) — Gentoo securityThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html
[SECURITY] Fedora 22 Update: ansible1.9-1.9.6-1.fc22Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1322925
1322925 – (CVE-2016-3096) CVE-2016-3096 ansible: Code execution vulnerability in lxc_containerIssue Tracking
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html
[SECURITY] Fedora 23 Update: ansible1.9-1.9.6-1.fc23Vendor Advisory
-
https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away
ansible/CHANGELOG.md at v2.0.2.0-1 · ansible/ansible · GitHubPatch
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html
[SECURITY] Fedora 24 Update: ansible-2.0.2.0-1.fc24Vendor Advisory
Jump to