A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
History

Wed, 06 Nov 2024 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:ee::el8
cpe:/a:redhat:ansible_automation_platform:ee::el9
References

Tue, 17 Sep 2024 06:30:00 +0000

Type Values Removed Values Added
Title Ansible: exposure of sensitive information in ansible vault files due to improper logging Ansible-core: exposure of sensitive information in ansible vault files due to improper logging
First Time appeared Redhat ansible Automation Platform
Redhat enterprise Linux Ai
CPEs cpe:/a:redhat:discovery:1.0::el8
cpe:/a:redhat:rhui:4::el8
cpe:/a:redhat:storage:3
cpe:/a:redhat:ansible_automation_platform:2
cpe:/a:redhat:enterprise_linux_ai:1
Vendors & Products Redhat discovery
Redhat rhui
Redhat storage
Redhat ansible Automation Platform
Redhat enterprise Linux Ai

Mon, 16 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 14 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Title ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging Ansible: exposure of sensitive information in ansible vault files due to improper logging
First Time appeared Redhat
Redhat discovery
Redhat rhui
Redhat storage
CPEs cpe:/a:redhat:discovery:1.0::el8
cpe:/a:redhat:rhui:4::el8
cpe:/a:redhat:storage:3
Vendors & Products Redhat
Redhat discovery
Redhat rhui
Redhat storage
References

Fri, 13 Sep 2024 23:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
Title ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging
Weaknesses CWE-532
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-09-14T02:15:14.907Z

Updated: 2024-11-11T17:38:13.547Z

Reserved: 2024-09-13T09:06:07.367Z

Link: CVE-2024-8775

cve-icon Vulnrichment

Updated: 2024-09-16T14:28:57.342Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-14T03:15:08.987

Modified: 2024-11-06T20:15:06.763

Link: CVE-2024-8775

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-09-13T08:35:00Z

Links: CVE-2024-8775 - Bugzilla