Redhat Ansible vulnerabilities
77 known vulnerabilities affecting redhat/ansible.
Total CVEs
77
CISA KEV
0
Public exploits
1
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH26MEDIUM38LOW5UNKNOWN1
Vulnerabilities
Page 2 of 4
CVE-2020-14332MEDIUMCVSS 5.5≥ 0, < 2.8.14≥ 2.9.0a1, < 2.9.12+1 more2022-02-09
CVE-2020-14332 [MEDIUM] CWE-117 Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible
Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from th
ghsaosv
CVE-2021-3583HIGHCVSS 7.1vansible_tower 3.7, ansible_engine 2.9.232021-09-22
CVE-2021-3583 [HIGH] CWE-20 CVE-2021-3583: A flaw was found in Ansible, where a user's controller is vulnerable to template injection
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which disclos
cvelistv5ghsaosv
CVE-2021-3533UNKNOWN≥ 0, < 3.0.02021-06-09
CVE-2021-3533 CVE-2021-3533: A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory
A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansi
osv
CVE-2020-10729MEDIUMCVSS 5.5vansible-engine 2.9.62021-05-27
CVE-2020-10729 [MEDIUM] CWE-330 CVE-2020-10729: A flaw was found in the use of insufficiently random values in Ansible
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.
cvelistv5ghsaosv
CVE-2021-20191MEDIUMCVSS 5.5fixed in 2.8.19≥ 2.9.0, < 2.9.18+2 more2021-05-26
CVE-2021-20191 [MEDIUM] CWE-532 CVE-2021-20191: A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by def
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are
cvelistv5ghsanvdosv
CVE-2021-20178MEDIUMCVSS 5.5fixed in 2.9.18vbefore 2.9.182021-05-26
CVE-2021-20178 [MEDIUM] CWE-532 CVE-2021-20178: A flaw was found in ansible module where credentials are disclosed in the console log by default and
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
cvelistv5ghsanvdosv
CVE-2021-20228HIGHCVSS 7.5vansible-engine 2.9.182021-04-29
CVE-2021-20228 [HIGH] CWE-200 CVE-2021-20228: A flaw was found in the Ansible Engine 2
A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.
cvelistv5ghsaosv
CVE-2019-14905HIGHCVSS 5.6≥ 2.7.0a1, < 2.7.16≥ 2.8.0a1, < 2.8.8+1 more2021-04-20
CVE-2019-14905 [HIGH] CWE-20 Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible
Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used t
ghsaosv
CVE-2020-1737HIGHCVSS 7.8≥ 2.8.0a1, < 2.8.9≥ 2.9.0a1, < 2.9.6+1 more2021-04-20
CVE-2020-1737 [HIGH] CWE-22 Path Traversal in Ansible
Path Traversal in Ansible
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
ghsaosv
CVE-2020-1746MEDIUMCVSS 5.0≥ 2.8.0a1, < 2.8.11≥ 2.9.0a1, < 2.9.7+1 more2021-04-20
CVE-2020-1746 [MEDIUM] CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ansible
Exposure of Sensitive Information to an Unauthorized Actor in ansible
A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to
ghsaosv
CVE-2020-10691MEDIUMCVSS 5.2≥ 2.9.0a1, < 2.9.72021-04-20
CVE-2020-10691 [MEDIUM] CWE-22 Path Traversal in Ansible
Path Traversal in Ansible
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running `ansible-galaxy collection` install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.
ghsaosv
CVE-2020-1753MEDIUMCVSS 5.5≥ 2.7.0a1, < 2.7.18≥ 2.8.0a1, < 2.8.12+1 more2021-04-07
CVE-2020-1753 [MEDIUM] CWE-200 Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible
Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible
ghsaosv
CVE-2020-10685MEDIUMCVSS 5.5≥ 2.7.0a1, < 2.7.17≥ 2.8.0a1, < 2.8.11+1 more2021-04-07
CVE-2020-10685 [MEDIUM] CWE-377 Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s
ghsaosv
CVE-2021-3447MEDIUMCVSS 5.5fixed in 1.2.2vRed Hat Ansible Automation Platform 1.2.2, Ansible Tower 3.8.22021-04-01
CVE-2021-3447 [MEDIUM] CWE-532 CVE-2021-3447: A flaw was found in several ansible modules, where parameters containing credentials, such as secret
A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal th
cvelistv5nvdosv
CVE-2020-25646HIGHCVSS 7.5≥ 0, < 2.10.1-r02020-10-29
CVE-2020-25646 [HIGH] CVE-2020-25646: A flaw was found in Ansible Collection community
A flaw was found in Ansible Collection community.crypto. openssl_privatekey_info exposes private key in logs. This directly impacts confidentiality
osv
CVE-2020-25636HIGHCVSS 7.1v2.10.12020-10-05
CVE-2020-25636 [HIGH] CWE-377 CVE-2020-25636: A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace s
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
nvd
CVE-2020-25635MEDIUMCVSS 5.5v2.10.12020-10-05
CVE-2020-25635 [MEDIUM] CWE-212 CVE-2020-25635: A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is no
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
ghsanvdosv
CVE-2020-14365HIGHCVSS 7.1vansible-engine 2.8.15, ansible-engine 2.9.132020-09-23
CVE-2020-14365 [HIGH] CWE-347 CVE-2020-14365: A flaw was found in the Ansible Engine, in ansible-engine 2
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via packag
cvelistv5ghsaosv
CVE-2019-14904HIGHCVSS 7.3fixed in 2.7.15≥ 2.8.0, < 2.8.7+2 more2020-08-26
CVE-2019-14904 [HIGH] CWE-20 CVE-2019-14904: A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the nam
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the r
cvelistv5ghsanvdosv
CVE-2020-10744MEDIUMCVSS 5.0≥ 2.7.0, ≤ 2.7.18≥ 2.8.0, ≤ 2.8.12+1 more2020-05-15
CVE-2020-10744 [MEDIUM] CWE-377 CVE-2020-10744: An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary direct
An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansib
ghsanvdosv