Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-3828

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-27 Mar, 2019 | 00:00
Updated At-04 Aug, 2024 | 19:19
Rejected At-
Credits

Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:27 Mar, 2019 | 00:00
Updated At:04 Aug, 2024 | 19:19
Rejected At:
â–¼CVE Numbering Authority (CNA)

Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.

Affected Products
Vendor
Red Hat, Inc.Red Hat
Product
Ansible
Versions
Affected
  • 2.5.15
  • 2.6.14
  • 2.7.8
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22
Type: CWE
CWE ID: CWE-22
Description: CWE-22
Metrics
VersionBase scoreBase severityVector
3.04.2MEDIUM
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Version: 3.0
Base score: 4.2
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/ansible/ansible/pull/52133
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828
N/A
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
vendor-advisory
https://usn.ubuntu.com/4072-1/
vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
vendor-advisory
https://access.redhat.com/errata/RHSA-2019:3744
vendor-advisory
https://access.redhat.com/errata/RHSA-2019:3789
vendor-advisory
http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html
N/A
Hyperlink: https://github.com/ansible/ansible/pull/52133
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
Resource:
vendor-advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
Resource:
vendor-advisory
Hyperlink: https://usn.ubuntu.com/4072-1/
Resource:
vendor-advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
Resource:
vendor-advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3744
Resource:
vendor-advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3789
Resource:
vendor-advisory
Hyperlink: http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/ansible/ansible/pull/52133
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
vendor-advisory
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
vendor-advisory
x_transferred
https://usn.ubuntu.com/4072-1/
vendor-advisory
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
vendor-advisory
x_transferred
https://access.redhat.com/errata/RHSA-2019:3744
vendor-advisory
x_transferred
https://access.redhat.com/errata/RHSA-2019:3789
vendor-advisory
x_transferred
http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html
x_transferred
Hyperlink: https://github.com/ansible/ansible/pull/52133
Resource:
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828
Resource:
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
Resource:
vendor-advisory
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
Resource:
vendor-advisory
x_transferred
Hyperlink: https://usn.ubuntu.com/4072-1/
Resource:
vendor-advisory
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
Resource:
vendor-advisory
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3744
Resource:
vendor-advisory
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3789
Resource:
vendor-advisory
x_transferred
Hyperlink: http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html
Resource:
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:27 Mar, 2019 | 13:29
Updated At:12 Jun, 2023 | 07:15

Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.2MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Secondary3.04.2MEDIUM
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Primary2.03.3LOW
AV:L/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.1
Base score: 4.2
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.0
Base score: 4.2
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 2.0
Base score: 3.3
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

Red Hat, Inc.
redhat
>>ansible>>Versions from 2.5.0(inclusive) to 2.5.15(exclusive)
cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>ansible>>Versions from 2.6.0(inclusive) to 2.6.14(exclusive)
cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>ansible>>Versions from 2.7.0(inclusive) to 2.7.8(exclusive)
cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE-22Secondarysecalert@redhat.com
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-22
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.htmlsecalert@redhat.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.htmlsecalert@redhat.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.htmlsecalert@redhat.com
Third Party Advisory
http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.htmlsecalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2019:3744secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3789secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://github.com/ansible/ansible/pull/52133secalert@redhat.com
Patch
Third Party Advisory
https://usn.ubuntu.com/4072-1/secalert@redhat.com
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3744
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:3789
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://github.com/ansible/ansible/pull/52133
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/4072-1/
Source: secalert@redhat.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

109Records found

CVE-2015-5322
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.17% / 38.10%
||
7 Day CHG~0.00%
Published-25 Nov, 2015 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to list directory contents and read arbitrary files in the Jenkins servlet resources via directory traversal sequences in a request to jnlpJars/.

Action-Not Available
Vendor-n/aRed Hat, Inc.Jenkins
Product-openshiftjenkinsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2015-3151
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.48%
||
7 Day CHG~0.00%
Published-14 Jan, 2020 | 17:47
Updated-06 Aug, 2024 | 05:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.

Action-Not Available
Vendor-Red Hat, Inc.ABRT
Product-automatic_bug_reporting_toolABRT
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-3760
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-93.83% / 99.86%
||
7 Day CHG~0.00%
Published-26 Jun, 2018 | 19:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.

Action-Not Available
Vendor-sprockets_projectDebian GNU/LinuxHackerOneRed Hat, Inc.
Product-enterprise_linuxcloudformsdebian_linuxsprocketsSprockets
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-4650
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-7.23% / 91.64%
||
7 Day CHG~0.00%
Published-20 Feb, 2020 | 16:01
Updated-06 Aug, 2024 | 11:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.

Action-Not Available
Vendor-n/aRed Hat, Inc.Python Software Foundation
Product-pythonsoftware_collectionsenterprise_linuxn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2014-3702
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-1.12% / 78.30%
||
7 Day CHG~0.00%
Published-16 Oct, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a .. (dot dot) the session parameter.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-edeployn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2014-0130
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-45.37% / 97.61%
||
7 Day CHG~0.00%
Published-07 May, 2014 | 10:00
Updated-22 Oct, 2025 | 01:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.

Action-Not Available
Vendor-n/aRuby on RailsRed Hat, Inc.
Product-enterprise_linux_serverrailssubscription_asset_managern/aRuby on Rails
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-10926
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-1.39% / 80.41%
||
7 Day CHG~0.00%
Published-04 Sep, 2018 | 15:00
Updated-05 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.

Action-Not Available
Vendor-glusterDebian GNU/LinuxRed Hat, Inc.openSUSE
Product-enterprise_linux_serverdebian_linuxenterprise_linuxvirtualization_hostglusterfsleapglusterfs
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-1079
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.7||HIGH
EPSS-0.41% / 61.22%
||
7 Day CHG~0.00%
Published-12 Apr, 2018 | 17:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

Action-Not Available
Vendor-clusterlabsunspecifiedRed Hat, Inc.
Product-pacemaker_command_line_interfaceenterprise_linuxpcs
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2012-6607
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.05% / 14.13%
||
7 Day CHG~0.00%
Published-23 Nov, 2013 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augsave file in a backup save action, a different vector than CVE-2012-0786.

Action-Not Available
Vendor-augeasn/a
Product-augeasn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found