Description
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2202-1 | ansible security update |
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2020-0004 | A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs. |
Github GHSA |
GHSA-923p-fr2c-g5m2 | Exposure of Sensitive Information to an Unauthorized Actor in Ansible |
Ubuntu USN |
USN-7330-1 | Ansible vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.852Z
Reserved: 2019-11-27T00:00:00.000Z
Link: CVE-2020-1739
No data.
Status : Modified
Published: 2020-03-12T18:15:12.337
Modified: 2024-11-21T05:11:16.950
Link: CVE-2020-1739
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN