Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10217

Опубликовано: 25 нояб. 2019
Источник: debian
EPSS Низкий

Описание

A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ansiblefixed2.8.6+dfsg-1package
ansiblenot-affectedbusterpackage
ansiblenot-affectedstretchpackage
ansiblenot-affectedjessiepackage

Примечания

  • https://github.com/ansible/ansible/issues/56269

  • https://github.com/ansible/ansible/pull/59427

  • Introduced by: https://github.com/ansible/ansible/commit/08918c6c2bcd73eb40b89af31736d3fcbe55e75a (v2.8.0a1)

  • Fixed by: https://github.com/ansible/ansible/commit/c1ee1f142db1e669b710a65147ea32be47a91519

EPSS

Процентиль: 63%
0.00449
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.

CVSS3: 5.7
redhat
больше 6 лет назад

A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.

CVSS3: 6.5
nvd
около 6 лет назад

A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.

CVSS3: 6.5
github
больше 4 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in ansible

suse-cvrf
почти 6 лет назад

Security update for ansible

EPSS

Процентиль: 63%
0.00449
Низкий