{"id":"CVE-2020-1734","details":"A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.","aliases":["GHSA-h39q-95q5-9jfp","PYSEC-2020-6"],"modified":"2026-03-23T05:04:48.538774947Z","published":"2020-03-03T22:15:10.843Z","related":["SUSE-SU-2020:3309-1","SUSE-SU-2022:3338-1","SUSE-SU-2022:3339-1","openSUSE-SU-2022:0081-1","openSUSE-SU-2024:10615-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"ADVISORY","url":"https://github.com/ansible/ansible/issues/67792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1734"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ansible/ansible","events":[{"introduced":"0"},{"last_affected":"8fd406ee8e3a14be72b3cbbfe91d03fe35952f95"},{"introduced":"0"},{"last_affected":"d28e4b63c7b70acbaf0a1fedd53c91b6686574a0"},{"introduced":"0"},{"last_affected":"9388be4269bdf83406bfa9245142de8b7dc8cfbc"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.16"},{"introduced":"0"},{"last_affected":"2.8.8"},{"introduced":"0"},{"last_affected":"2.9.5"}]}}],"versions":["0.0.1","0.0.2","0.01","0.3","0.7","stable-2.9-branchpoint","v1.0","v1.1","v1.2","v1.4.0","v1.5.0","v1.5.1","v1.6.0","v1_last","v2.0.0-0.1.alpha1","v2.0.0-0.2.alpha2","v2.0.0-0.3.beta1","v2.0.0-0.4.beta2","v2.0.0-0.5.beta3","v2.6.0a1","v2.7.0","v2.7.0.a1","v2.7.0b1","v2.7.0rc1","v2.7.0rc2","v2.7.0rc3","v2.7.0rc4","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.14","v2.7.15","v2.7.16","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v2.8.0","v2.8.0a1","v2.8.0b1","v2.8.0rc1","v2.8.0rc2","v2.8.0rc3","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.9.0","v2.9.0b1","v2.9.0rc1","v2.9.0rc2","v2.9.0rc3","v2.9.0rc4","v2.9.0rc5","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v2.9.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.3.4"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-1734.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"}]}