Red Hat Ansible Engine 2.7.18

CPE Details

Red Hat Ansible Engine 2.7.18
2.7.18
2021-01-28
15h22 +00:00
2021-01-28
15h22 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:ansible_engine:2.7.18:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

ansible_engine

Version

2.7.18

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-3620 2022-03-03 18h23 +00:00 A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
5.5
Medium
CVE-2021-3583 2021-09-21 22h00 +00:00 A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
7.1
High
CVE-2020-10729 2021-05-27 16h46 +00:00 A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
5.5
Medium
CVE-2020-14330 2020-09-10 22h00 +00:00 An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
5.5
Medium
CVE-2019-14858 2019-10-14 12h36 +00:00 A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.
5.5
Medium
CVE-2018-16859 2018-11-29 16h00 +00:00 Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
4.4
Medium