A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ansible_automation_platform:ee::el8 cpe:/a:redhat:ansible_automation_platform:ee::el9 |
|
References |
|
Tue, 17 Sep 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Ansible: exposure of sensitive information in ansible vault files due to improper logging | Ansible-core: exposure of sensitive information in ansible vault files due to improper logging |
First Time appeared |
Redhat ansible Automation Platform
Redhat enterprise Linux Ai |
|
CPEs | cpe:/a:redhat:rhui:4::el8 cpe:/a:redhat:storage:3 |
cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:enterprise_linux_ai:1 |
Vendors & Products |
Redhat discovery
Redhat rhui Redhat storage |
Redhat ansible Automation Platform
Redhat enterprise Linux Ai |
Mon, 16 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 14 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging | Ansible: exposure of sensitive information in ansible vault files due to improper logging |
First Time appeared |
Redhat
Redhat discovery Redhat rhui Redhat storage |
|
CPEs | cpe:/a:redhat:discovery:1.0::el8 cpe:/a:redhat:rhui:4::el8 cpe:/a:redhat:storage:3 |
|
Vendors & Products |
Redhat
Redhat discovery Redhat rhui Redhat storage |
|
References |
|
Fri, 13 Sep 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions. | |
Title | ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging | |
Weaknesses | CWE-532 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-09-14T02:15:14.907Z
Updated: 2024-11-11T17:38:13.547Z
Reserved: 2024-09-13T09:06:07.367Z
Link: CVE-2024-8775
Vulnrichment
Updated: 2024-09-16T14:28:57.342Z
NVD
Status : Awaiting Analysis
Published: 2024-09-14T03:15:08.987
Modified: 2024-11-06T20:15:06.763
Link: CVE-2024-8775
Redhat