CVE-2020-14330

An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330 Issue Tracking Vendor Advisory
https://github.com/ansible/ansible/issues/68400 Exploit Issue Tracking Third Party Advisory
https://www.debian.org/security/2021/dsa-4950 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

11 Nov 2022, 02:47

Type Values Removed Values Added
CWE CWE-116 CWE-532

02 Nov 2021, 17:12

Type Values Removed Values Added
CWE CWE-532 CWE-116
References (MISC) https://github.com/ansible/ansible/issues/68400 - Third Party Advisory (MISC) https://github.com/ansible/ansible/issues/68400 - Exploit, Issue Tracking, Third Party Advisory

19 Oct 2021, 13:26

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4950 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CWE CWE-116 CWE-532

Information

Published : 2020-09-11 18:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-14330

Mitre link : CVE-2020-14330

CVE.ORG link : CVE-2020-14330


JSON object : View

Products Affected

redhat

  • ansible_engine

debian

  • debian_linux
CWE
CWE-532

Insertion of Sensitive Information into Log File