CVE-2018-16859

Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-11-29 18:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-16859

Mitre link : CVE-2018-16859

CVE.ORG link : CVE-2018-16859


JSON object : View

Products Affected

redhat

  • ansible_engine
CWE
CWE-532

Insertion of Sensitive Information into Log File