First published: Thu Feb 20 2020(Updated: )
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in `sources.list`, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the `deb http://user:pass@server:port/` format.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/ansible | <1.5.5 | 1.5.5 |
Redhat Ansible | <1.5.5 | |
debian/ansible | 2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 7.7.0+dfsg-3+deb12u1 10.1.0+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4660 is a vulnerability in Ansible before version 1.5.5 that allows local users to obtain sensitive credential information.
CVE-2014-4660 works by constructing filenames with user and password fields based on deb lines in sources.list, which can be exploited to obtain sensitive credential information.
CVE-2014-4660 has a severity rating of 5.5 (medium).
To fix CVE-2014-4660, update Ansible to version 1.5.5 or later.
More information about CVE-2014-4660 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2014-4660), [GitHub](https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08), [Ansible Changelog](https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md).