An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330 | Issue Tracking Vendor Advisory |
https://github.com/ansible/ansible/issues/68400 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2021/dsa-4950 | Third Party Advisory |
Configurations
History
11 Nov 2022, 02:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-532 |
02 Nov 2021, 17:12
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/ansible/ansible/issues/68400 - Exploit, Issue Tracking, Third Party Advisory | |
CWE | CWE-116 |
19 Oct 2021, 13:26
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-532 | |
References |
|
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
Information
Published : 2020-09-11 18:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-14330
Mitre link : CVE-2020-14330
CVE.ORG link : CVE-2020-14330
JSON object : View
Products Affected
debian
- debian_linux
redhat
- ansible_engine
CWE
CWE-532
Insertion of Sensitive Information into Log File