A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2202-1 | ansible security update |
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2020-0004 | A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs. |
Github GHSA |
GHSA-923p-fr2c-g5m2 | Exposure of Sensitive Information to an Unauthorized Actor in Ansible |
Ubuntu USN |
USN-7330-1 | Ansible vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.852Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2020-1739
No data.
Status : Modified
Published: 2020-03-12T18:15:12.337
Modified: 2024-11-21T05:11:16.950
Link: CVE-2020-1739
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN