A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3963-1 ansible security update
EUVD EUVD EUVD-2024-3182 A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.
Github GHSA Github GHSA GHSA-32p4-gm2c-wmch ansible-core Incorrect Authorization vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

In the play that uses the user module with the key generation option, have a prior task ensuring the public key does not exist for example: - name: avoid user exploit (change name depending on other options used in user task) file: path=/home/{{username}}/.ssh/id_rsa.pub state=absent

History

Tue, 04 Nov 2025 08:30:00 +0900

Type Values Removed Values Added
References

Sun, 31 Aug 2025 06:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat ansible Core
CPEs cpe:/a:redhat:ansible_automation_platform:ee::el9 cpe:/a:redhat:ansible_core:2::el8
cpe:/a:redhat:ansible_core:2::el9
Vendors & Products Redhat ansible Core

Mon, 14 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00044}

epss

{'score': 0.0004}


Sat, 12 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00037}

epss

{'score': 0.00044}


Sat, 05 Jul 2025 14:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:10
Vendors & Products Redhat enterprise Linux

Wed, 26 Feb 2025 05:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:openstack:17.1 cpe:/a:redhat:openstack:17.1::el9
References

Wed, 04 Dec 2024 01:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:2.4::el8
cpe:/a:redhat:ansible_automation_platform:2.4::el9
cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8
cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9
cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8
cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9
References

Mon, 25 Nov 2024 08:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside
CPEs cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8
cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9
cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8
cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9
Vendors & Products Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside
References

Sat, 23 Nov 2024 00:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:2.5::el8
cpe:/a:redhat:ansible_automation_platform:2.5::el9

Thu, 07 Nov 2024 05:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:ee::el8
cpe:/a:redhat:ansible_automation_platform:ee::el9
References

Thu, 07 Nov 2024 00:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 Nov 2024 22:30:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 06 Nov 2024 19:00:00 +0900

Type Values Removed Values Added
Description A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.
Title Ansible-core: ansible-core user may read/write unauthorized content
First Time appeared Redhat
Redhat ansible Automation Platform
Redhat openstack
Weaknesses CWE-863
CPEs cpe:/a:redhat:ansible_automation_platform:2
cpe:/a:redhat:openstack:17.1
Vendors & Products Redhat
Redhat ansible Automation Platform
Redhat openstack
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-06T23:17:23.106Z

Reserved: 2024-10-12T02:46:57.580Z

Link: CVE-2024-9902

cve-icon Vulnrichment

Updated: 2025-11-03T22:33:34.510Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-06T10:15:06.200

Modified: 2025-11-03T23:17:34.743

Link: CVE-2024-9902

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-06T06:11:25Z

Links: CVE-2024-9902 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses