The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ansible | Redhat | * | 1.9.1 (including) |
Ansible | Ubuntu | esm-infra-legacy/trusty | * |
Ansible | Ubuntu | trusty | * |
Ansible | Ubuntu | trusty/esm | * |
Ansible | Ubuntu | upstream | * |
Ansible | Ubuntu | vivid | * |