logo

CVE-2020-1739 ansible

Package

Manager: pip
Name: ansible
Vulnerable Version: >=0 <2.7.17 || >=2.8.0a1 <2.8.11 || >=2.9.0a1 <2.9.7

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00041 pctl0.11748

Details

Exposure of Sensitive Information to an Unauthorized Actor in Ansible A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.

Metadata

Created: 2021-04-07T20:30:44Z
Modified: 2024-09-06T17:53:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-923p-fr2c-g5m2/GHSA-923p-fr2c-g5m2.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-923p-fr2c-g5m2
Finding: F017
Auto approve: 1