Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14332

Опубликовано: 16 июл. 2020
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.

Отчет

The version of ansible provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and 3 does not contain the vulnerable functionality and is not affected by this vulnerability. Additionally, these storage products no longer maintains their own version of ansible and fixes are consumed from core Ansible repository.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Tower 3ansibleOut of support scope
Red Hat Ceph Storage 2ansibleNot affected
Red Hat Ceph Storage 3ansibleNot affected
Red Hat OpenStack Platform 10 (Newton)ansibleOut of support scope
Red Hat OpenStack Platform 13 (Queens)ansibleNot affected
Red Hat Storage 3ansibleNot affected
Red Hat Ansible Engine 2.8 for RHEL 7ansibleFixedRHSA-2020:360001.09.2020
Red Hat Ansible Engine 2.8 for RHEL 8ansibleFixedRHSA-2020:360001.09.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-117
Дефект:
CWE-532
https://bugzilla.redhat.com/show_bug.cgi?id=1857805Ansible: module_args does not censor properly in --check mode

EPSS

Процентиль: 36%
0.00149
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 5 лет назад

A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.

CVSS3: 5.5
nvd
больше 5 лет назад

A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.

CVSS3: 5.5
debian
больше 5 лет назад

A flaw was found in the Ansible Engine when using module_args. Tasks e ...

CVSS3: 5.5
github
почти 4 года назад

Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible

CVSS3: 5.5
fstec
больше 5 лет назад

Уязвимость системы управления конфигурациями Ansible, связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 36%
0.00149
Низкий

5.5 Medium

CVSS3