Current Description

A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.

Basic Data

PublishedMarch 03, 2020
Last ModifiedMay 29, 2020
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-78
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score3.7
Exploitability Score1.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatAnsible Engine********2.7.16
    2.3ApplicationRedhatAnsible Engine2.8.8*******
    2.3ApplicationRedhatAnsible Engine2.9.5*******
    2.3ApplicationRedhatAnsible Tower********3.3.4
    2.3ApplicationRedhatAnsible Tower3.4.5*******
    2.3ApplicationRedhatAnsible Tower3.5.5*******
    2.3ApplicationRedhatAnsible Tower3.6.3*******

Vulnerable Software List

Redhat Ansible Tower *, 3.4.5, 3.5.5, 3.6.3
Redhat Ansible Engine *, 2.8.8, 2.9.5


NameSourceURLTags Tracking Third Party Advisory Party Advisory