- Description
- Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 3.6
- Exploitability score
- 0.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E62BD2FE-C4AF-421A-8530-C85F90DF94C7",
"versionEndExcluding": "2.5.13"
},
{
"criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "49547662-9D65-42DA-8478-797E21D28716",
"versionEndExcluding": "2.6.10",
"versionStartIncluding": "2.6.0"
},
{
"criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06477DCA-01D0-424D-B85F-795804DF7E1A",
"versionEndExcluding": "2.7.4",
"versionStartIncluding": "2.7.0"
},
{
"criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "50F84E75-E5B1-4FE7-B89E-1EB5139B4293",
"versionEndIncluding": "2.8",
"versionStartIncluding": "2.7.5"
}
],
"operator": "OR"
}
]
}
]