Vulnerability Details : CVE-2016-9587
Public exploit exists!
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
Vulnerability category: Input validationExecute code
Products affected by CVE-2016-9587
- cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
- cpe:2.3:a:ansible:ansible:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9587
10.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9587
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
Red Hat, Inc. | |
6.6
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.7
|
5.9
|
Red Hat, Inc. | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2016-9587
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2016-9587
-
http://www.securityfocus.com/bid/95352
Ansible CVE-2016-9587 Arbitrary Command Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2017-0195.html
RHSA-2017:0195 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587
1404378 – (CVE-2016-9587) CVE-2016-9587 Ansible: Compromised remote hosts can lead to running commands on the Ansible controllerIssue Tracking;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1685
RHSA-2017:1685 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.exploit-db.com/exploits/41013/
Ansible 2.1.4/2.2.1 - Command ExecutionExploit;Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:0515
RHSA-2017:0515 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:0448
RHSA-2017:0448 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201701-77
Ansible: Remote execution of arbitrary code (GLSA 201701-77) — Gentoo securityThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2017-0260.html
RHSA-2017:0260 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to