Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing " src=" clause, (2) a trailing " temp=" clause, or (3) a trailing " validate=" clause accompanied by a shell command.
{
"binaries": [
{
"binary_name": "ansible",
"binary_version": "1.5.4+dfsg-1ubuntu0.1~esm2"
},
{
"binary_name": "ansible-fireball",
"binary_version": "1.5.4+dfsg-1ubuntu0.1~esm2"
},
{
"binary_name": "ansible-node-fireball",
"binary_version": "1.5.4+dfsg-1ubuntu0.1~esm2"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}