Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8775

Опубликовано: 13 сент. 2024
Источник: redhat
CVSS3: 5.5

Описание

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

Отчет

This issue is classified as moderate rather than important because while it does expose sensitive information during playbook execution, the exposure is limited to logs and output generated during the run, which is typically accessible only to authorized users with sufficient privileges. The flaw does not result in an immediate or direct compromise of systems, as no remote exploitation vector is introduced. Additionally, the risk can be mitigated through proper configuration (no_log: true) and access control measures, reducing the likelihood of unauthorized access to the logged data. However, the unintentional disclosure of secrets like passwords or API keys still presents a potential risk for privilege escalation or lateral movement within an environment, justifying a moderate severity rating.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10ansible-coreAffected
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-nvidia-rhel9Fix deferred
Ansible Automation Platform Execution Environmentsansible-automation-platform/ansible-builder-rhel8FixedRHSA-2024:896906.11.2024
Ansible Automation Platform Execution Environmentsansible-automation-platform/ansible-builder-rhel9FixedRHSA-2024:896906.11.2024
Ansible Automation Platform Execution Environmentsansible-automation-platform/ee-29-rhel8FixedRHSA-2024:896906.11.2024
Ansible Automation Platform Execution Environmentsansible-automation-platform/ee-minimal-rhel8FixedRHSA-2024:896906.11.2024
Ansible Automation Platform Execution Environmentsansible-automation-platform/ee-minimal-rhel9FixedRHSA-2024:896906.11.2024
Discovery 1 for RHEL 9discovery/discovery-server-rhel9FixedRHSA-2025:124910.02.2025
Discovery 1 for RHEL 9discovery/discovery-ui-rhel9FixedRHSA-2025:124910.02.2025
Red Hat Ansible Automation Platform 2.4 for RHEL 8ansible-coreFixedRHSA-2024:1076203.12.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-532
https://bugzilla.redhat.com/show_bug.cgi?id=2312119ansible-core: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
11 месяцев назад

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

CVSS3: 5.5
nvd
11 месяцев назад

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

CVSS3: 5.5
msrc
около 1 месяца назад

Описание отсутствует

CVSS3: 5.5
debian
11 месяцев назад

A flaw was found in Ansible, where sensitive information stored in Ans ...

suse-cvrf
6 месяцев назад

Recommended update 4.3.15 for Multi-Linux Manager Client Tools

5.5 Medium

CVSS3