A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1975767 | Issue Tracking Patch Third Party Advisory |
https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes | Release Notes Third Party Advisory |
https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html |
Configurations
Configuration 1 (hide)
|
History
28 Dec 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Feb 2023, 23:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Feb 2023, 21:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Mar 2022, 12:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux For Power Little Endian
Redhat virtualization Manager Redhat virtualization Host Redhat virtualization Redhat ansible Automation Platform Early Access Redhat ansible Engine Redhat virtualization For Ibm Power Little Endian Redhat enterprise Linux Redhat openstack Redhat |
|
CWE | CWE-209 | |
References | (MISC) https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0 - Patch, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1975767 - Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes - Release Notes, Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization_manager:4.4:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:1:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization_for_ibm_power_little_endian:4.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_automation_platform_early_access:2.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
03 Mar 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-03 19:15
Updated : 2023-12-28 19:15
NVD link : CVE-2021-3620
Mitre link : CVE-2021-3620
CVE.ORG link : CVE-2021-3620
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_for_power_little_endian
- ansible_engine
- ansible_automation_platform_early_access
- openstack
- virtualization_for_ibm_power_little_endian
- virtualization_manager
- virtualization_host
- virtualization
CWE
CWE-209
Generation of Error Message Containing Sensitive Information