Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1746

Опубликовано: 28 фев. 2020
Источник: redhat
CVSS3: 5
EPSS Низкий

Описание

A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.

A flaw was found in the Ansible Engine when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.

Отчет

  • Ansible Engine 2.7.16, 2.8.10, and 2.9.6 as well as previous versions are affected.
  • Ansible Tower 3.4.5, 3.5.5 and 3.6.3 as well as previous versions are affected.
  • Red Hat Gluster Storage and Red Hat Ceph Storage no longer maintains their own version of Ansible. The fix will be provided from core Ansible. But we still ship ansible separately for ceph ubuntu.
  • In Red Hat OpenStack Platform, because the flaw has a lower impact, ansible is not directly customer exposed, and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package.

Меры по смягчению последствий

Using args keyword and embedding the ldap_auth variable instead of using bind_pw parameter would mitigate this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5ansibleNot affected
Red Hat Ceph Storage 2ansibleOut of support scope
Red Hat Ceph Storage 3ansibleAffected
Red Hat OpenStack Platform 10 (Newton)ansibleOut of support scope
Red Hat OpenStack Platform 13 (Queens)ansibleWill not fix
Red Hat Storage 3ansibleWill not fix
Red Hat Ansible Engine 2.7 for RHEL 7ansibleFixedRHSA-2020:154422.04.2020
Red Hat Ansible Engine 2.8 for RHEL 7ansibleFixedRHSA-2020:154322.04.2020
Red Hat Ansible Engine 2.8 for RHEL 8ansibleFixedRHSA-2020:154322.04.2020
Red Hat Ansible Engine 2.9 for RHEL 7ansibleFixedRHSA-2020:154122.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1805491ansible: Information disclosure issue in ldap_attr and ldap_entry modules

EPSS

Процентиль: 19%
0.00061
Низкий

5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5
ubuntu
больше 5 лет назад

A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.

CVSS3: 5
nvd
больше 5 лет назад

A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.

CVSS3: 5
debian
больше 5 лет назад

A flaw was found in the Ansible Engine affecting Ansible Engine versio ...

CVSS3: 5
github
почти 5 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in ansible

CVSS3: 5
fstec
больше 5 лет назад

Уязвимость системы управления конфигурациями Ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 19%
0.00061
Низкий

5 Medium

CVSS3