CVE-2014-4678
high-risk
Published 2020-02-20
The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.
Do I need to act?
~
4.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (14)
Third Party Advisory
https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q9...
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2014-4678
Third Party Advisory
https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-00...
Third Party Advisory
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678
Third Party Advisory
https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q9...
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2014-4678
Third Party Advisory
https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-00...
Third Party Advisory
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
8/34 · Low
Exposure
10/34 · Low