A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2202-1 | ansible security update |
![]() |
DSA-4950-1 | ansible security update |
![]() |
EUVD-2020-0004 | A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs. |
![]() |
GHSA-923p-fr2c-g5m2 | Exposure of Sensitive Information to an Unauthorized Actor in Ansible |
![]() |
USN-7330-1 | Ansible vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.852Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2020-1739

No data.

Status : Modified
Published: 2020-03-12T18:15:12.337
Modified: 2024-11-21T05:11:16.950
Link: CVE-2020-1739


No data.