A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1916813 | Issue Tracking Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html |
Configurations
Configuration 1 (hide)
|
History
28 Dec 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-05-26 21:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-20191
Mitre link : CVE-2021-20191
CVE.ORG link : CVE-2021-20191
JSON object : View
Products Affected
redhat
- docker_community_collection
- ansible
- ansible_tower
- google_cloud_platform_ansible_collection
- cisco_nx-os_collection
- community_network_collection
- community_general_collection
oracle
- virtualization
CWE
CWE-532
Insertion of Sensitive Information into Log File