Safety vulnerability ID: 54468
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment.
Latest version: 2.4.0
"Consistent Ansible Python API and CLI with container and process isolation runtime capabilities"
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application