Description
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0019 | Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable. |
Github GHSA |
GHSA-v735-2pp6-h86r | Ansible Logs Passwords If PowerShell ScriptBlock is Enabled |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T10:32:54.246Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16859
No data.
Status : Modified
Published: 2018-11-29T18:29:00.537
Modified: 2024-11-21T03:53:27.863
Link: CVE-2018-16859
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA