The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2015-6240 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 7.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:C/I:C/A:C |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Storage Console 2 | ansible | Not affected |
Red Hat OpenStack Platform 10 | ansible | Not affected |
Red Hat OpenShift Enterprise 3 | ansible | Not affected |
Red Hat Gluster Storage 3.0 | ansible | Not affected |