Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7550
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:2966 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1473645 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/ansible/ansible/issues/30874 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2966 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1473645 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ansible/ansible/issues/30874 | Issue Tracking, Third Party Advisory |
Vendor | Product | Version | ||
---|---|---|---|---|
Red Hat, Inc. | ansible |
Version: 2.3.x before 2.3.3, 2.4.x before 2.4.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:12.039Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ansible/ansible/issues/30874" }, { "name": "RHSA-2017:2966", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ansible", "vendor": "Red Hat, Inc.", "versions": [ { "status": "affected", "version": "2.3.x before 2.3.3, 2.4.x before 2.4.1" } ] } ], "datePublic": "2017-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-06T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ansible/ansible/issues/30874" }, { "name": "RHSA-2017:2966", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-7550", "datePublished": "2017-11-21T17:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-08-05T16:04:12.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7550\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-11-21T17:29:00.210\",\"lastModified\":\"2024-11-21T03:32:08.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \\\"params\\\" argument, and noting this in the module documentation.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en la manera en la que Ansible (en versiones 2.3.x anteriores a la 2.3.3 y versiones 2.4.x anteriores a la 2.4.1) pasaba algunos par\u00e1metros al m\u00f3dulo jenkins_plugin. Los atacantes remotos podr\u00edan utilizar este fallo para exponer informaci\u00f3n sensible de los logs de un host remoto. Este fallo se solucion\u00f3 no permitiendo que se especifiquen las contrase\u00f1as en el argumento \\\"params\\\" y anotando esto en la documentaci\u00f3n del m\u00f3dulo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3.0\",\"versionEndExcluding\":\"2.3.3\",\"matchCriteriaId\":\"97808ABA-37DE-4764-93C7-C005BFEFFEA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndExcluding\":\"2.4.1\",\"matchCriteriaId\":\"32FE5F5F-9A2F-43B8-B50B-57709B4F3DD4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2966\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1473645\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ansible/ansible/issues/30874\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1473645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ansible/ansible/issues/30874\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
pysec-2017-4
Vulnerability from pysec
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ansible", "purl": "pkg:pypi/ansible" }, "ranges": [ { "events": [ { "introduced": "2.4.0.0" }, { "fixed": "2.4.1.0" }, { "introduced": "2.3.0.0" }, { "fixed": "2.3.3.0" } ], "type": "ECOSYSTEM" } ], "versions": [ "2.3.0.0", "2.3.1.0", "2.3.2.0", "2.4.0.0" ] } ], "aliases": [ "CVE-2017-7550" ], "details": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "id": "PYSEC-2017-4", "modified": "2021-07-02T02:41:33.938371Z", "published": "2017-11-21T17:29:00Z", "references": [ { "type": "REPORT", "url": "https://github.com/ansible/ansible/issues/30874" }, { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "type": "ADVISORY", "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ] }
wid-sec-w-2024-1038
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux Server ist eine Linux-Distribution der Firma Red Hat.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux Server ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1038 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2024-1038.json" }, { "category": "self", "summary": "WID-SEC-2024-1038 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1038" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:2966 vom 2017-10-19", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "category": "external", "summary": "National Vulnerability Database #CVE-2017-7550 vom 2017-11-21", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0605-1 vom 2018-03-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180605-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3309-1 vom 2020-11-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1509-1 vom 2024-05-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018463.html" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux Server: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T10:06:32.592+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1038", "initial_release_date": "2017-10-19T22:00:00.000+00:00", "revision_history": [ { "date": "2017-10-19T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "2", "summary": "Prudukt Ansible hinzugef\u00fcgt. Nach R\u00fccksprache mit NV wird die Bewertung (bzgl. SH) nicht h\u00f6her gesetzt." }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "3", "summary": "Added references" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2018-03-05T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2020-11-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "8", "summary": "Korrektur" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.3.3", "product": { "name": "Open Source Ansible \u003c2.3.3", "product_id": "T011290" } }, { "category": "product_version", "name": "2.3.3", "product": { "name": "Open Source Ansible 2.3.3", "product_id": "T011290-fixed", "product_identification_helper": { "cpe": "cpe:/a:open_source:ansible:2.3.3" } } }, { "category": "product_version_range", "name": "\u003c2.4.1", "product": { "name": "Open Source Ansible \u003c2.4.1", "product_id": "T011291" } }, { "category": "product_version", "name": "2.4.1", "product": { "name": "Open Source Ansible 2.4.1", "product_id": "T011291-fixed", "product_identification_helper": { "cpe": "cpe:/a:open_source:ansible:2.4.1" } } } ], "category": "product_name", "name": "Ansible" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7 x86_64", "product": { "name": "Red Hat Enterprise Linux Server 7 x86_64", "product_id": "T010489", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7_x86_64" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7550", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux Server im Zusammenhang mit Ansible. Ein angemeldeter, entfernter Angreifer kann diese Schwachstelle nutzen, um Informationen offenzulegen, da es m\u00f6glich ist das Passwort als Parameter an das jenkins_plugin Modul zu \u00fcbergeben und dadurch in den Logs in Klartext sichtbar ist." } ], "product_status": { "known_affected": [ "T011290", "T011291", "T002207", "T010489" ] }, "release_date": "2017-10-19T22:00:00.000+00:00", "title": "CVE-2017-7550" } ] }
WID-SEC-W-2024-1038
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux Server ist eine Linux-Distribution der Firma Red Hat.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux Server ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1038 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2024-1038.json" }, { "category": "self", "summary": "WID-SEC-2024-1038 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1038" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:2966 vom 2017-10-19", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "category": "external", "summary": "National Vulnerability Database #CVE-2017-7550 vom 2017-11-21", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0605-1 vom 2018-03-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180605-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3309-1 vom 2020-11-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1509-1 vom 2024-05-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018463.html" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux Server: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T10:06:32.592+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1038", "initial_release_date": "2017-10-19T22:00:00.000+00:00", "revision_history": [ { "date": "2017-10-19T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "2", "summary": "Prudukt Ansible hinzugef\u00fcgt. Nach R\u00fccksprache mit NV wird die Bewertung (bzgl. SH) nicht h\u00f6her gesetzt." }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "3", "summary": "Added references" }, { "date": "2017-11-21T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2018-03-05T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2020-11-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "8", "summary": "Korrektur" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.3.3", "product": { "name": "Open Source Ansible \u003c2.3.3", "product_id": "T011290" } }, { "category": "product_version", "name": "2.3.3", "product": { "name": "Open Source Ansible 2.3.3", "product_id": "T011290-fixed", "product_identification_helper": { "cpe": "cpe:/a:open_source:ansible:2.3.3" } } }, { "category": "product_version_range", "name": "\u003c2.4.1", "product": { "name": "Open Source Ansible \u003c2.4.1", "product_id": "T011291" } }, { "category": "product_version", "name": "2.4.1", "product": { "name": "Open Source Ansible 2.4.1", "product_id": "T011291-fixed", "product_identification_helper": { "cpe": "cpe:/a:open_source:ansible:2.4.1" } } } ], "category": "product_name", "name": "Ansible" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7 x86_64", "product": { "name": "Red Hat Enterprise Linux Server 7 x86_64", "product_id": "T010489", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7_x86_64" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7550", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux Server im Zusammenhang mit Ansible. Ein angemeldeter, entfernter Angreifer kann diese Schwachstelle nutzen, um Informationen offenzulegen, da es m\u00f6glich ist das Passwort als Parameter an das jenkins_plugin Modul zu \u00fcbergeben und dadurch in den Logs in Klartext sichtbar ist." } ], "product_status": { "known_affected": [ "T011290", "T011291", "T002207", "T010489" ] }, "release_date": "2017-10-19T22:00:00.000+00:00", "title": "CVE-2017-7550" } ] }
gsd-2017-7550
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-7550", "description": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "id": "GSD-2017-7550", "references": [ "https://www.suse.com/security/cve/CVE-2017-7550.html", "https://access.redhat.com/errata/RHSA-2017:2966", "https://advisories.mageia.org/CVE-2017-7550.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-7550" ], "details": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "id": "GSD-2017-7550", "modified": "2023-12-13T01:21:06.186273Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-7550", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ansible", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.3.x before 2.3.3, 2.4.x before 2.4.1" } ] } } ] }, "vendor_name": "Red Hat, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-532", "lang": "eng", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2017:2966", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "name": "https://github.com/ansible/ansible/issues/30874", "refsource": "MISC", "url": "https://github.com/ansible/ansible/issues/30874" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=2.3.0,\u003c2.3.3||\u003e=2.4.0,\u003c2.4.1", "affected_versions": "All versions starting from 2.3.0 before 2.3.3, all versions starting from 2.4.0 before 2.4.1", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2019-10-09", "description": "A flaw was found in the way Ansible passed certain parameters to the `jenkins_plugin` module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs.", "fixed_versions": [ "2.3.3.0", "2.4.1.0" ], "identifier": "CVE-2017-7550", "identifiers": [ "CVE-2017-7550" ], "not_impacted": "All versions before 2.3.0, all versions starting from 2.3.3 before 2.4.0, all versions starting from 2.4.1", "package_slug": "pypi/ansible", "pubdate": "2017-11-21", "solution": "Upgrade to versions 2.3.3.0, 2.4.1.0 or above.", "title": "Inclusion of Sensitive Information in Log Files", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2017-7550", "https://access.redhat.com/errata/RHSA-2017:2966", "https://bugzilla.redhat.com/show_bug.cgi?id=1473645", "https://github.com/ansible/ansible/issues/30874" ], "uuid": "6d86d051-fc8f-4d78-993d-e282d907da43" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.3.3", "versionStartIncluding": "2.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.4.1", "versionStartIncluding": "2.4.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-7550" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ansible/ansible/issues/30874", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/30874" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "name": "RHSA-2017:2966", "refsource": "REDHAT", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-12T23:31Z", "publishedDate": "2017-11-21T17:29Z" } } }
fkie_cve-2017-7550
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:2966 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1473645 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/ansible/ansible/issues/30874 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2966 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1473645 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ansible/ansible/issues/30874 | Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "97808ABA-37DE-4764-93C7-C005BFEFFEA9", "versionEndExcluding": "2.3.3", "versionStartIncluding": "2.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "32FE5F5F-9A2F-43B8-B50B-57709B4F3DD4", "versionEndExcluding": "2.4.1", "versionStartIncluding": "2.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en la manera en la que Ansible (en versiones 2.3.x anteriores a la 2.3.3 y versiones 2.4.x anteriores a la 2.4.1) pasaba algunos par\u00e1metros al m\u00f3dulo jenkins_plugin. Los atacantes remotos podr\u00edan utilizar este fallo para exponer informaci\u00f3n sensible de los logs de un host remoto. Este fallo se solucion\u00f3 no permitiendo que se especifiquen las contrase\u00f1as en el argumento \"params\" y anotando esto en la documentaci\u00f3n del m\u00f3dulo." } ], "id": "CVE-2017-7550", "lastModified": "2024-11-21T03:32:08.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T17:29:00.210", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/30874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/30874" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
rhsa-2017_2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ansible is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.\n\nThe ansible packages have been upgraded to upstream version 2.4.0, which provides a number of bug fixes and enhancements over the previous version. For more information, please see the Ansible 2.4 Porting Guide linked in the References section. (BZ#1492477)\n\nSecurity Fix(es):\n\n* A flaw was found in the way Ansible passed certain parameters to the jenkins_plugin module. A remote attacker could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation. (CVE-2017-7550)\n\nRed Hat would like to thank Stefano Mazzucco (Kirontech) for reporting this issue.\n\nBug Fix(es):\n\n* A bug in the SELinux module, which caused a corruption of the SELinux configuration file, has been fixed.\n\n* Previously, some of the functionality of Ansible (the json_query filter) was unavailable, because the dependency on the python2-jmespath package was missing. Now, the missing dependency has been added. (BZ#1484910)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2966", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.ansible.com/ansible/2.4/porting_guide_2.4.html", "url": "https://docs.ansible.com/ansible/2.4/porting_guide_2.4.html" }, { "category": "external", "summary": "1473645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "category": "external", "summary": "1484910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484910" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2966.json" } ], "title": "Red Hat Security Advisory: ansible security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:32:54+00:00", "generator": { "date": "2024-11-22T11:32:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2966", "initial_release_date": "2017-10-19T14:53:42+00:00", "revision_history": [ { "date": "2017-10-19T14:53:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-10-19T14:53:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:32:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product": { "name": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product_id": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.0.0-5.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.0.0-5.el7.noarch", "product": { "name": "ansible-0:2.4.0.0-5.el7.noarch", "product_id": "ansible-0:2.4.0.0-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.0.0-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ansible-0:2.4.0.0-5.el7.src", "product": { "name": "ansible-0:2.4.0.0-5.el7.src", "product_id": "ansible-0:2.4.0.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.0.0-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.0.0-5.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch" }, "product_reference": "ansible-0:2.4.0.0-5.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.0.0-5.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src" }, "product_reference": "ansible-0:2.4.0.0-5.el7.src", "relates_to_product_reference": "7Server-EXTRAS-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.0.0-5.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" }, "product_reference": "ansible-doc-0:2.4.0.0-5.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Stefano Mazzucco" ], "organization": "Kirontech" } ], "cve": "CVE-2017-7550", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2017-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1473645" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Ansible passed certain parameters to the jenkins_plugin module. A remote attacker could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible: jenkins_plugin module exposes passwords in remote host logs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform will no longer be updating the Ansible package in: \n\n* Red Hat OpenStack Platform 10 (Newton)\n* Red Hat OpenStack Platform 11 (Ocata)\n\nAs of Red Hat Enterprise Linux 7.4, customers can consume an updated Ansible package directly from the extras-rhel-7.4 channel. For more information, refer to Red Hat Enterprise Linux release information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7550" }, { "category": "external", "summary": "RHBZ#1473645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7550", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550" } ], "release_date": "2017-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-19T14:53:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ansible: jenkins_plugin module exposes passwords in remote host logs" } ] }
RHSA-2017:2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ansible is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.\n\nThe ansible packages have been upgraded to upstream version 2.4.0, which provides a number of bug fixes and enhancements over the previous version. For more information, please see the Ansible 2.4 Porting Guide linked in the References section. (BZ#1492477)\n\nSecurity Fix(es):\n\n* A flaw was found in the way Ansible passed certain parameters to the jenkins_plugin module. A remote attacker could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation. (CVE-2017-7550)\n\nRed Hat would like to thank Stefano Mazzucco (Kirontech) for reporting this issue.\n\nBug Fix(es):\n\n* A bug in the SELinux module, which caused a corruption of the SELinux configuration file, has been fixed.\n\n* Previously, some of the functionality of Ansible (the json_query filter) was unavailable, because the dependency on the python2-jmespath package was missing. Now, the missing dependency has been added. (BZ#1484910)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2966", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.ansible.com/ansible/2.4/porting_guide_2.4.html", "url": "https://docs.ansible.com/ansible/2.4/porting_guide_2.4.html" }, { "category": "external", "summary": "1473645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "category": "external", "summary": "1484910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484910" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2966.json" } ], "title": "Red Hat Security Advisory: ansible security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:32:54+00:00", "generator": { "date": "2024-11-22T11:32:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2966", "initial_release_date": "2017-10-19T14:53:42+00:00", "revision_history": [ { "date": "2017-10-19T14:53:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-10-19T14:53:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:32:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product": { "name": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product_id": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.0.0-5.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.0.0-5.el7.noarch", "product": { "name": "ansible-0:2.4.0.0-5.el7.noarch", "product_id": "ansible-0:2.4.0.0-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.0.0-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ansible-0:2.4.0.0-5.el7.src", "product": { "name": "ansible-0:2.4.0.0-5.el7.src", "product_id": "ansible-0:2.4.0.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.0.0-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.0.0-5.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch" }, "product_reference": "ansible-0:2.4.0.0-5.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.0.0-5.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src" }, "product_reference": "ansible-0:2.4.0.0-5.el7.src", "relates_to_product_reference": "7Server-EXTRAS-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.0.0-5.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" }, "product_reference": "ansible-doc-0:2.4.0.0-5.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Stefano Mazzucco" ], "organization": "Kirontech" } ], "cve": "CVE-2017-7550", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2017-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1473645" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Ansible passed certain parameters to the jenkins_plugin module. A remote attacker could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible: jenkins_plugin module exposes passwords in remote host logs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform will no longer be updating the Ansible package in: \n\n* Red Hat OpenStack Platform 10 (Newton)\n* Red Hat OpenStack Platform 11 (Ocata)\n\nAs of Red Hat Enterprise Linux 7.4, customers can consume an updated Ansible package directly from the extras-rhel-7.4 channel. For more information, refer to Red Hat Enterprise Linux release information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7550" }, { "category": "external", "summary": "RHBZ#1473645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7550", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550" } ], "release_date": "2017-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-19T14:53:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ansible: jenkins_plugin module exposes passwords in remote host logs" } ] }
rhsa-2017:2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ansible is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.\n\nThe ansible packages have been upgraded to upstream version 2.4.0, which provides a number of bug fixes and enhancements over the previous version. For more information, please see the Ansible 2.4 Porting Guide linked in the References section. (BZ#1492477)\n\nSecurity Fix(es):\n\n* A flaw was found in the way Ansible passed certain parameters to the jenkins_plugin module. A remote attacker could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation. (CVE-2017-7550)\n\nRed Hat would like to thank Stefano Mazzucco (Kirontech) for reporting this issue.\n\nBug Fix(es):\n\n* A bug in the SELinux module, which caused a corruption of the SELinux configuration file, has been fixed.\n\n* Previously, some of the functionality of Ansible (the json_query filter) was unavailable, because the dependency on the python2-jmespath package was missing. Now, the missing dependency has been added. (BZ#1484910)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2966", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.ansible.com/ansible/2.4/porting_guide_2.4.html", "url": "https://docs.ansible.com/ansible/2.4/porting_guide_2.4.html" }, { "category": "external", "summary": "1473645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "category": "external", "summary": "1484910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484910" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2966.json" } ], "title": "Red Hat Security Advisory: ansible security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:32:54+00:00", "generator": { "date": "2024-11-22T11:32:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2966", "initial_release_date": "2017-10-19T14:53:42+00:00", "revision_history": [ { "date": "2017-10-19T14:53:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-10-19T14:53:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:32:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product": { "name": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product_id": "ansible-doc-0:2.4.0.0-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.0.0-5.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.0.0-5.el7.noarch", "product": { "name": "ansible-0:2.4.0.0-5.el7.noarch", "product_id": "ansible-0:2.4.0.0-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.0.0-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ansible-0:2.4.0.0-5.el7.src", "product": { "name": "ansible-0:2.4.0.0-5.el7.src", "product_id": "ansible-0:2.4.0.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.0.0-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.0.0-5.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch" }, "product_reference": "ansible-0:2.4.0.0-5.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.0.0-5.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src" }, "product_reference": "ansible-0:2.4.0.0-5.el7.src", "relates_to_product_reference": "7Server-EXTRAS-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.0.0-5.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" }, "product_reference": "ansible-doc-0:2.4.0.0-5.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Stefano Mazzucco" ], "organization": "Kirontech" } ], "cve": "CVE-2017-7550", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2017-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1473645" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Ansible passed certain parameters to the jenkins_plugin module. A remote attacker could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible: jenkins_plugin module exposes passwords in remote host logs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform will no longer be updating the Ansible package in: \n\n* Red Hat OpenStack Platform 10 (Newton)\n* Red Hat OpenStack Platform 11 (Ocata)\n\nAs of Red Hat Enterprise Linux 7.4, customers can consume an updated Ansible package directly from the extras-rhel-7.4 channel. For more information, refer to Red Hat Enterprise Linux release information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7550" }, { "category": "external", "summary": "RHBZ#1473645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7550", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550" } ], "release_date": "2017-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-19T14:53:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.noarch", "7Server-EXTRAS-7.4:ansible-0:2.4.0.0-5.el7.src", "7Server-EXTRAS-7.4:ansible-doc-0:2.4.0.0-5.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ansible: jenkins_plugin module exposes passwords in remote host logs" } ] }
ghsa-588w-w6mv-3cw5
Vulnerability from github
9.3 (Critical) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ansible" }, "ranges": [ { "events": [ { "introduced": "2.4.0.0" }, { "fixed": "2.4.1.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "ansible" }, "ranges": [ { "events": [ { "introduced": "2.3.0.0" }, { "fixed": "2.3.3.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-7550" ], "database_specific": { "cwe_ids": [ "CWE-532" ], "github_reviewed": true, "github_reviewed_at": "2023-02-08T18:09:23Z", "nvd_published_at": "2017-11-21T17:29:00Z", "severity": "CRITICAL" }, "details": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.", "id": "GHSA-588w-w6mv-3cw5", "modified": "2024-09-04T19:59:34Z", "published": "2022-05-13T01:06:04Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7550" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/issues/30874" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/commit/facbf7f14da29eea67ef68ab386fc15bd06d7c7f" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2966" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2017-7550" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473645" }, { "type": "PACKAGE", "url": "https://github.com/ansible/ansible" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2017-4.yaml" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Ansible Insertion of Sensitive Information into Log File vulnerability" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.