{"id":"CVE-2023-5115","details":"An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.","aliases":["GHSA-jpvw-p8pr-9g2x"],"modified":"2026-03-23T05:04:29.296951527Z","published":"2023-12-18T14:15:10.500Z","related":["openSUSE-SU-2024:13311-1","openSUSE-SU-2024:14251-1","openSUSE-SU-2024:14537-1","openSUSE-SU-2025:15638-1","openSUSE-SU-2025:15754-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:5701"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:5758"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-5115"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233810"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-5115.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.2"}]},{"events":[{"introduced":"0"},{"last_affected":"2.3"}]},{"events":[{"introduced":"0"},{"last_affected":"2.4"}]},{"events":[{"introduced":"0"},{"last_affected":"1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"1.2"}]},{"events":[{"introduced":"0"},{"last_affected":"1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"}]}