Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14864

Опубликовано: 02 янв. 2020
Источник: debian

Описание

Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ansiblefixed2.9.2+dfsg-1package
ansiblenot-affectedstretchpackage
ansiblenot-affectedjessiepackage

Примечания

  • https://github.com/ansible/ansible/issues/63522

  • https://github.com/ansible/ansible/pull/63527

  • Introduced in https://github.com/ansible/ansible/commit/91da1653e0b592d4d67c5fb3ecd4fa60c797ff03 (2.6)

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.

CVSS3: 5.7
redhat
больше 6 лет назад

Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.

CVSS3: 6.5
nvd
около 6 лет назад

Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.

CVSS3: 6.5
github
почти 6 лет назад

Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible

CVSS3: 6.5
fstec
около 6 лет назад

Уязвимость модулей Splunk и Sumologic системы управления конфигурациями Ansible, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации