Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5764: Improper Neutralization of Special Elements Used in a Template Engine in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8

0
High
VulnerabilityCVE-2023-5764cvecve-2023-5764
Published: Tue Dec 12 2023 (12/12/2023, 22:01:33 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Ansible Automation Platform 2.4 for RHEL 8

Description

A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data.

AI-Powered Analysis

AILast updated: 11/20/2025, 18:34:39 UTC

Technical Analysis

CVE-2023-5764 is a template injection vulnerability identified in Red Hat Ansible Automation Platform 2.4 running on Red Hat Enterprise Linux 8. The root cause lies in the internal templating engine used by the Ansible controller, where the mechanism that marks template data as unsafe can be improperly neutralized or bypassed. This flaw allows an attacker who can supply template data—typically through files or inputs processed by the controller—to inject malicious template code. Because Ansible uses Jinja2 templating extensively for automation tasks, this injection can lead to arbitrary code execution within the controller's environment. The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction (UI:N). The CVSS score of 7.1 reflects high impact on confidentiality and integrity, as an attacker could potentially read or modify sensitive automation workflows or credentials managed by Ansible. However, availability is not impacted. No public exploits or active exploitation have been reported yet, but the vulnerability poses a significant risk due to the critical role Ansible plays in automating IT infrastructure. The lack of patch links suggests that remediation may require vendor updates or configuration changes to restrict template input sources. Organizations relying on Ansible for orchestration and configuration management should assess their exposure and apply mitigations promptly.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of automated workflows and sensitive data managed by Ansible Automation Platform. Successful exploitation could allow attackers to execute arbitrary code on the Ansible controller, potentially leading to unauthorized access to credentials, manipulation of infrastructure configurations, and lateral movement within the network. This is particularly critical for sectors relying heavily on automation for infrastructure management, such as finance, telecommunications, energy, and government. Since Ansible is widely used in enterprise environments across Europe, the vulnerability could disrupt critical services if exploited. The requirement for local access limits remote exploitation but insider threats or compromised accounts could leverage this flaw. The absence of known exploits provides a window for proactive defense, but the high severity demands immediate attention to prevent potential breaches.

Mitigation Recommendations

1. Apply official patches or updates from Red Hat as soon as they become available for Ansible Automation Platform 2.4 on RHEL 8. 2. Restrict access to the Ansible controller to trusted administrators only, enforcing strict access controls and monitoring. 3. Implement file integrity monitoring on template files and inputs to detect unauthorized modifications or suspicious files. 4. Use role-based access control (RBAC) within Ansible to limit who can supply or modify templates. 5. Audit and review all template files and automation scripts for unsafe or untrusted inputs. 6. Consider isolating the Ansible controller in a hardened environment with minimal network exposure. 7. Employ logging and alerting on anomalous template processing activities to detect exploitation attempts early. 8. Educate administrators about the risks of template injection and enforce secure coding practices in automation scripts. These steps go beyond generic advice by focusing on controlling template input sources, access restrictions, and proactive monitoring tailored to this vulnerability's nature.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-10-25T10:27:46.601Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5c4ce672cd9080e8d3ac

Added to database: 11/20/2025, 6:22:04 PM

Last enriched: 11/20/2025, 6:34:39 PM

Last updated: 1/7/2026, 8:54:58 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats