First published: Fri Jul 21 2017(Updated: )
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | >=2.3.0<2.3.3 | |
Redhat Ansible | >=2.4.0<2.4.1 | |
Redhat Enterprise Linux Server | =7.0 | |
pip/ansible | >=2.3.0.0<2.3.3.0 | 2.3.3.0 |
pip/ansible | >=2.4.0.0<2.4.1.0 | 2.4.1.0 |
>=2.3.0<2.3.3 | ||
>=2.4.0<2.4.1 | ||
=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.