Hi!
I'm not sending this in as a security issue, as I don't think there are playbooks like that in the wild.

If I understood the changes in 1.6.7+ properly, they were about protecting against injecting arguments like this:

  - set_fact:
      foo: 'bar" mode="0666'
  - copy: content="{{ foo }}" dest=/etc/somesecret

But it seems it's still possible to create playbooks that are not safe against argument injection:

  - set_fact:
      foo: 'bar\n", "mode": "0666'
  - copy: ""
    args: '{ "content": "{{ foo }}", "dest": "/tmp/foo" }'

Is it by accident, or is templating the whole args dictionary considered too funky to be used (and so, to secure)?

---
Tomasz Kontusz

--
You received this message because you are subscribed to the Google Groups "Ansible 
Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/53EA74A7.8050205%40gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to