{"id":"CVE-2017-7481","details":"Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.","aliases":["GHSA-w578-j992-554x","PYSEC-2018-41"],"modified":"2026-04-09T05:55:33.957626Z","published":"2018-07-19T13:29:00.340Z","related":["MGASA-2017-0164","SUSE-SU-2017:3029-1","openSUSE-SU-2017:2976-1","openSUSE-SU-2017:2978-1","openSUSE-SU-2019:0238-1","openSUSE-SU-2024:10615-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2524"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1244"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4072-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/98492"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1334"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1476"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1499"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1599"},{"type":"FIX","url":"https://github.com/ansible/ansible/commit/ed56f51f185a1ffd7ea57130d260098686fcc7c2"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7481"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ansible/ansible","events":[{"introduced":"0"},{"fixed":"ecb38fdf73a0beb89e9505157a2ea20c96f666d7"},{"introduced":"c7052b42c76bc626c481f22018d3396b84199a24"},{"fixed":"d14467b0294296b9a2b85e0ad150315c2d5a2491"},{"fixed":"ed56f51f185a1ffd7ea57130d260098686fcc7c2"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.3.1.0"},{"introduced":"2.3.2.0"},{"fixed":"2.4.0.0"}]}}],"versions":["0.0.1","0.01","0.3","0.7","v1.0","v1.1","v1.2","v1.4.0","v1.6.0","v2.0.0-0.1.alpha1","v2.0.0-0.2.alpha2","v2.0.0-0.3.beta1","v2.0.0-0.4.beta2","v2.0.0-0.5.beta3","v2.3.0.0-0.1.rc1","v2.3.0.0-0.2.rc2","v2.3.0.0-0.3.rc3","v2.3.0.0-0.4.rc4","v2.3.0.0-0.5.rc5","v2.3.0.0-0.6.rc6","v2.3.0.0-1","v2.3.1.0-0.1.rc1","v2.3.1.0-0.2.rc2","v2.4.0.0-0.1.rc1","v2.4.0.0-0.2.rc2","v2.4.0.0-0.3.rc3","v2.4.0.0-0.4.rc4","v2.4.0.0-0.5.rc5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7481.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.3"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"10"}]},{"events":[{"introduced":"0"},{"last_affected":"11"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}