{"id":"CVE-2020-10684","details":"A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.","aliases":["GHSA-p62g-jhg6-v3rq","PYSEC-2020-207"],"modified":"2026-04-16T04:35:15.503630920Z","published":"2020-03-24T14:15:12.327Z","related":["SUSE-SU-2020:3309-1","openSUSE-SU-2022:0081-1","openSUSE-SU-2024:10615-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4950"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202006-11"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ansible/ansible","events":[{"introduced":"0a07068054090d5b78b27496aa251be74c484b45"},{"fixed":"f78a5b184c6f8b1bc774ed795a2bd36d38f6506b"},{"introduced":"2611867fd1dc387ceaa0ffb8ce0f030aafc2a859"},{"fixed":"668cdc3ce88d9d69093a81271b34c69897ef2b57"},{"introduced":"24325a05dfb9104d6d4ec8b488b89e07c2e6d376"},{"fixed":"9e3ccd64b6a233390cd70c314193b6ba1aacfe21"}],"database_specific":{"versions":[{"introduced":"2.7.0"},{"fixed":"2.7.17"},{"introduced":"2.8.0"},{"fixed":"2.8.9"},{"introduced":"2.9.0"},{"fixed":"2.9.6"}]}}],"versions":["v2.7.0","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.14","v2.7.15","v2.7.16","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v2.8.0","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.9.0","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v2.9.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10684.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.3.5"}]},{"events":[{"introduced":"3.5.0"},{"last_affected":"3.5.5"}]},{"events":[{"introduced":"3.6.0"},{"last_affected":"3.6.3"}]},{"events":[{"introduced":"0"},{"last_affected":"10"}]},{"events":[{"introduced":"0"},{"last_affected":"13"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}]}