logo

CVE-2018-16859 ansible

Package

Manager: pip
Name: ansible
Vulnerable Version: >=2.7.0a1 <2.7.3 || >=0 <2.5.12 || >=2.6.0a1 <2.6.9

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00101 pctl0.28543

Details

Ansible Logs Passwords If PowerShell ScriptBlock is Enabled Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.

Metadata

Created: 2022-05-14T01:14:00Z
Modified: 2024-09-04T19:38:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v735-2pp6-h86r/GHSA-v735-2pp6-h86r.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-v735-2pp6-h86r
Finding: F005
Auto approve: 1