#VU50428 Inclusion of Sensitive Information in Log Files in Ansible


Published: 2021-02-09 | Updated: 2021-02-22

Vulnerability identifier: #VU50428

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-20178

CWE-ID: CWE-532

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Ansible
Server applications / Remote management servers, RDP, SSH

Vendor: Red Hat Inc.

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the snmp_facts module in Ansible discloses 'authkey' and 'privkey' credentials. A local user with access to the output of playbook execution can obtain SNMP credentials.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Ansible: 2.10.0 - 2.10.5


CPE

External links
http://security.archlinux.org/advisory/ASA-202102-9
http://bugzilla.redhat.com/show_bug.cgi?id=1914774
http://github.com/ansible-collections/community.general/pull/1621
http://github.com/ansible-collections/community.general/commit/fa2d2d6971d668f82207dd3e265820fdb4b0048d


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability