Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9902: Incorrect Authorization

0
Medium
VulnerabilityCVE-2024-9902cvecve-2024-9902
Published: Wed Nov 06 2024 (11/06/2024, 09:56:54 UTC)
Source: CVE Database V5

Description

A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:12:33 UTC

Technical Analysis

CVE-2024-9902 is an authorization vulnerability found in the ansible-core user module affecting versions 0 through 2.18.0b1. The flaw arises because the module allows an unprivileged user to silently create or overwrite any file on any system path and assume ownership of that file when a privileged user executes the user module targeting the unprivileged user's home directory. This occurs if the unprivileged user has directory traversal permissions on the directory containing the target file, enabling them to control the file's contents fully. The vulnerability leverages the interaction between unprivileged user permissions and privileged execution of Ansible tasks, effectively bypassing intended access controls. The CVSS v3.1 score is 6.3 (medium), reflecting the requirement for local access, high attack complexity, low privileges, and user interaction, but with high confidentiality and integrity impacts and low availability impact. No public exploits are known, but the vulnerability could be used for privilege escalation or implanting persistent malicious files. The issue affects environments where Ansible is used for configuration management and automation, particularly where unprivileged users have directory traversal rights and privileged users run Ansible playbooks against their home directories.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of critical systems managed via Ansible. Attackers with local access could manipulate configuration files, implant backdoors, or escalate privileges by exploiting the flaw, potentially compromising entire automation workflows. This could lead to unauthorized data access, disruption of automated deployments, or persistent footholds in enterprise environments. Organizations in sectors such as finance, manufacturing, telecommunications, and government, which heavily rely on Ansible for infrastructure automation, are particularly vulnerable. The medium severity rating suggests the vulnerability is exploitable but requires specific conditions, limiting widespread exploitation but still posing a serious threat in targeted attacks. The lack of known exploits currently provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Immediately upgrade ansible-core to a patched version beyond 2.18.0b1 once available. 2. Restrict directory traversal permissions for unprivileged users, especially on directories containing sensitive or system-critical files. 3. Avoid running Ansible user module tasks against directories where unprivileged users have write or traversal permissions. 4. Implement strict access controls and monitoring on Ansible playbook executions, ensuring only trusted users can run privileged tasks. 5. Use file integrity monitoring to detect unauthorized changes to critical files potentially targeted by this vulnerability. 6. Conduct regular audits of user permissions and Ansible configurations to identify and remediate risky permission settings. 7. Employ network segmentation and endpoint protection to limit local access opportunities for unprivileged users. 8. Educate system administrators about the risk and signs of exploitation related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-12T02:46:57.580Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909325c35043901e83099e5

Added to database: 11/3/2025, 10:53:16 PM

Last enriched: 11/3/2025, 11:12:33 PM

Last updated: 11/5/2025, 1:47:58 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats