In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.
The product does not neutralize or incorrectly neutralizes output that is written to logs.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ansible_engine | Redhat | * | 2.6.20 (excluding) |
Ansible_engine | Redhat | 2.7.0 (including) | 2.7.14 (excluding) |
Ansible_engine | Redhat | 2.8.0 (including) | 2.8.6 (excluding) |
Red Hat Ansible Engine 2.6 for RHEL 7 | RedHat | ansible-0:2.6.20-1.el7ae | * |
Red Hat Ansible Engine 2.7 for RHEL 7 | RedHat | ansible-0:2.7.14-1.el7ae | * |
Red Hat Ansible Engine 2.8 for RHEL 7 | RedHat | ansible-0:2.8.6-1.el7ae | * |
Red Hat Ansible Engine 2.8 for RHEL 8 | RedHat | ansible-0:2.8.6-1.el8ae | * |
Red Hat Ansible Engine 2 for RHEL 7 | RedHat | ansible-0:2.8.6-1.el7ae | * |
Red Hat Ansible Engine 2 for RHEL 8 | RedHat | ansible-0:2.8.6-1.el8ae | * |
Red Hat OpenStack Platform 13.0 (Queens) | RedHat | ansible-0:2.6.20-1.el7ae | * |
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS | RedHat | ansible-0:2.6.20-1.el7ae | * |
Ansible | Ubuntu | bionic | * |
Ansible | Ubuntu | disco | * |
Ansible | Ubuntu | eoan | * |
Ansible | Ubuntu | trusty | * |
Ansible | Ubuntu | trusty/esm | * |
Ansible | Ubuntu | xenial | * |
This can allow an attacker to forge log entries or inject malicious content into logs. Log forging vulnerabilities occur when: