CVE-2019-14846

In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:2.8.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*

History

22 Apr 2022, 19:56

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4950 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

07 Aug 2021, 15:15

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

07 Jun 2021, 15:04

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:ansible_engine:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:2.7.0:*:*:*:*:*:*:*

26 Mar 2021, 22:15

Type Values Removed Values Added
Summary Ansible, all ansible_engine-2.x versions and ansible_engine-3.x up to ansible_engine-3.5, was logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process. In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.

28 Jan 2021, 16:45

Type Values Removed Values Added
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0756 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0756 - Vendor Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html - Mailing List, Third Party Advisory
References (CONFIRM) https://github.com/ansible/ansible/pull/63366 - (CONFIRM) https://github.com/ansible/ansible/pull/63366 - Patch, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html - Mailing List, Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846 - Issue Tracking, Third Party Advisory (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846 - Issue Tracking, Vendor Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:3207 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:3207 - Vendor Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:3201 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:3201 - Vendor Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:3202 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:3202 - Vendor Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:3203 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:3203 - Vendor Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html - Mailing List, Third Party Advisory
CPE cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_engine:2.8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

28 Jan 2021, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html -
CWE CWE-117

Information

Published : 2019-10-08 19:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-14846

Mitre link : CVE-2019-14846

CVE.ORG link : CVE-2019-14846


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • ansible_engine
  • openstack
  • enterprise_linux_server

opensuse

  • leap
  • backports_sle
CWE
CWE-117

Improper Output Neutralization for Logs

CWE-532

Insertion of Sensitive Information into Log File