CVE-2021-20180Log File Information Exposure in Redhat Ansible

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 88.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 16
Latest updateMar 17

Description

A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDredhat/ansible< 2.9.18
PyPIredhat/ansible2.8.0a12.8.19+1
Debianredhat/ansible< 2.10.7-1+3
CVEListV5redhat/ansibleFixed in ansible 2.9.18

🔴Vulnerability Details

4
OSV
Insertion of Sensitive Information into Log File in ansible2022-03-17
GHSA
Insertion of Sensitive Information into Log File in ansible2022-03-17
OSV
CVE-2021-20180: A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using2022-03-16
CVEList
CVE-2021-20180: A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using2022-03-16

📋Vendor Advisories

2
Red Hat
module: bitbucket_pipeline_variable exposes secured values2021-01-13
Debian
CVE-2021-20180: ansible - A flaw was found in ansible module where credentials are disclosed in the consol...2021