An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330 | Issue Tracking Vendor Advisory |
https://github.com/ansible/ansible/issues/68400 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2021/dsa-4950 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330 | Issue Tracking Vendor Advisory |
https://github.com/ansible/ansible/issues/68400 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2021/dsa-4950 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/ansible/ansible/issues/68400 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4950 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.0 |
Information
Published : 2020-09-11 18:15
Updated : 2024-11-21 05:03
NVD link : CVE-2020-14330
Mitre link : CVE-2020-14330
CVE.ORG link : CVE-2020-14330
JSON object : View
Products Affected
debian
- debian_linux
redhat
- ansible_engine
CWE
CWE-532
Insertion of Sensitive Information into Log File