A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ansible_automation_platform:2.4::el8 cpe:/a:redhat:ansible_automation_platform:2.4::el9 cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8 cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9 cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8 cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9 |
|
References |
|
Thu, 21 Nov 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside |
|
CPEs | cpe:/a:redhat:ansible_automation_platform:2.5::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el9 cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8 cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9 cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8 cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9 |
|
Vendors & Products |
Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside |
|
References |
|
Wed, 06 Nov 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ansible_automation_platform:ee::el8 cpe:/a:redhat:ansible_automation_platform:ee::el9 |
|
References |
|
Tue, 17 Sep 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Ansible: exposure of sensitive information in ansible vault files due to improper logging | Ansible-core: exposure of sensitive information in ansible vault files due to improper logging |
First Time appeared |
Redhat ansible Automation Platform
Redhat enterprise Linux Ai |
|
CPEs | cpe:/a:redhat:rhui:4::el8 cpe:/a:redhat:storage:3 |
cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:enterprise_linux_ai:1 |
Vendors & Products |
Redhat discovery
Redhat rhui Redhat storage |
Redhat ansible Automation Platform
Redhat enterprise Linux Ai |
Mon, 16 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 14 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging | Ansible: exposure of sensitive information in ansible vault files due to improper logging |
First Time appeared |
Redhat
Redhat discovery Redhat rhui Redhat storage |
|
CPEs | cpe:/a:redhat:discovery:1.0::el8 cpe:/a:redhat:rhui:4::el8 cpe:/a:redhat:storage:3 |
|
Vendors & Products |
Redhat
Redhat discovery Redhat rhui Redhat storage |
|
References |
|
Fri, 13 Sep 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions. | |
Title | ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging | |
Weaknesses | CWE-532 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-09-14T02:15:14.907Z
Updated: 2024-12-18T15:17:26.584Z
Reserved: 2024-09-13T09:06:07.367Z
Link: CVE-2024-8775
Vulnrichment
Updated: 2024-09-16T14:28:57.342Z
NVD
Status : Awaiting Analysis
Published: 2024-09-14T03:15:08.987
Modified: 2024-12-03T17:15:14.090
Link: CVE-2024-8775
Redhat