A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:7773 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1536 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2010 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-5189 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2234387 | vendor advisory issue tracking exploit |