logo

CVE-2020-1746 ansible

Package

Manager: pip
Name: ansible
Vulnerable Version: >=2.8.0a1 <2.8.11 || >=2.9.0a1 <2.9.7 || >=2.7.0a1 <2.7.17

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00059 pctl0.18489

Details

Exposure of Sensitive Information to an Unauthorized Actor in ansible A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the `bind_pw` in the parameters field. The highest threat from this vulnerability is data confidentiality.

Metadata

Created: 2021-04-20T16:43:53Z
Modified: 2024-09-11T16:56:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-j2h6-73x8-22c4/GHSA-j2h6-73x8-22c4.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-j2h6-73x8-22c4
Finding: F038
Auto approve: 1