Skip to content

Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible

Moderate severity GitHub Reviewed Published Apr 7, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

pip ansible (pip)

Affected versions

>= 2.7.0, < 2.7.17
>= 2.8.0, < 2.8.11
>= 2.9.0, < 2.9.7

Patched versions

2.7.17
2.8.11
2.9.7

Description

A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.

References

Published by the National Vulnerability Database Mar 16, 2020
Reviewed Apr 5, 2021
Published to the GitHub Advisory Database Apr 7, 2021
Last updated Feb 1, 2023

Severity

Moderate
5.5
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2020-1753

GHSA ID

GHSA-86hp-cj9j-33vv
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.