Description
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.
Published: 2017-11-21
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-0004 A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.
Github GHSA Github GHSA GHSA-588w-w6mv-3cw5 Ansible Insertion of Sensitive Information into Log File vulnerability
History

No history.

Subscriptions

Redhat Ansible Enterprise Linux Server Rhel Extras Other
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T16:04:12.039Z

Reserved: 2017-04-05T00:00:00.000Z

Link: CVE-2017-7550

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-11-21T17:29:00.210

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-7550

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-09-25T00:00:00Z

Links: CVE-2017-7550 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses