{"id":"CVE-2023-39059","details":"An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter.","aliases":["GHSA-3r32-cp7v-5wq4"],"modified":"2026-04-12T08:00:59.093644Z","published":"2023-08-28T22:15:08.983Z","references":[{"type":"ADVISORY","url":"https://gist.github.com/Alevsk/1757da24c5fb8db735d392fd4146ca3a"},{"type":"EVIDENCE","url":"https://www.alevsk.com/2023/07/a-quick-story-of-security-pitfalls-with-execcommand-in-software-integrations/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/semaphoreui/semaphore","events":[{"introduced":"0"},{"last_affected":"b94cb98ca69e3cf13ac8a830c6fb59e433cd9261"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"2.8.90"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:ansible-semaphore:ansible_semaphore:2.8.90:*:*:*:*:ansible:*:*"}}],"versions":["2.0-beta","v2.0","v2.0-alpha","v2.0-beta","v2.0-beta-2","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.1.0","v2.2.0","v2.3.0","v2.4.0","v2.4.1","v2.5.0","v2.5.1","v2.5.2","v2.5.3","v2.6.0","v2.6.1","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.7.0","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.14","v2.7.15","v2.7.16","v2.7.2","v2.7.22","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v2.8.0","v2.8.1","v2.8.10","v2.8.11","v2.8.12","v2.8.13","v2.8.14","v2.8.15","v2.8.16","v2.8.17","v2.8.19","v2.8.2","v2.8.20","v2.8.21","v2.8.22","v2.8.23","v2.8.24","v2.8.25","v2.8.26","v2.8.27","v2.8.28","v2.8.29","v2.8.3","v2.8.30","v2.8.31","v2.8.32","v2.8.33","v2.8.34","v2.8.35","v2.8.37","v2.8.39","v2.8.4","v2.8.40","v2.8.41","v2.8.42","v2.8.43","v2.8.44","v2.8.45","v2.8.46","v2.8.47","v2.8.48","v2.8.49","v2.8.5","v2.8.50","v2.8.51","v2.8.53","v2.8.54","v2.8.55","v2.8.6","v2.8.60","v2.8.62","v2.8.63","v2.8.64","v2.8.65","v2.8.75","v2.8.76","v2.8.77","v2.8.8","v2.8.80","v2.8.81","v2.8.82","v2.8.83","v2.8.84","v2.8.85","v2.8.86","v2.8.87","v2.8.88","v2.8.89","v2.8.9","v2.8.90"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39059.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}