CVE-2018-16859 — Log File Information Exposure in Redhat Ansible Engine
Severity
4.4MEDIUMNVD
CNA4.2
EPSS
0.1%
top 73.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 29
Latest updateMay 14
Description
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 0.8 | Impact: 3.6
Affected Packages4 packages
Patches
🔴Vulnerability Details
4CVEList▶
CVE-2018-16859: Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to↗2018-11-29
OSV▶
CVE-2018-16859: Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to↗2018-11-29
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2018-16859 ansible: become password logged in plaintext when used with PowerShell on Windows↗2018-11-14