CVE-2020-14330

An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330 Issue Tracking Vendor Advisory
https://github.com/ansible/ansible/issues/68400 Exploit Issue Tracking Third Party Advisory
https://www.debian.org/security/2021/dsa-4950 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

11 Nov 2022, 02:47

Type Values Removed Values Added
CWE CWE-116 CWE-532

02 Nov 2021, 17:12

Type Values Removed Values Added
References (MISC) https://github.com/ansible/ansible/issues/68400 - Third Party Advisory (MISC) https://github.com/ansible/ansible/issues/68400 - Exploit, Issue Tracking, Third Party Advisory
CWE CWE-532 CWE-116

19 Oct 2021, 13:26

Type Values Removed Values Added
CWE CWE-116 CWE-532
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4950 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2020-09-11 18:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-14330

Mitre link : CVE-2020-14330

CVE.ORG link : CVE-2020-14330


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • ansible_engine
CWE
CWE-532

Insertion of Sensitive Information into Log File