First published: Wed Nov 14 2018(Updated: )
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Engine | <2.5.13 | |
Redhat Ansible Engine | >=2.6.0<2.6.10 | |
Redhat Ansible Engine | >=2.7.0<2.7.4 | |
Redhat Ansible Engine | >=2.7.5<=2.8 | |
redhat/ansible-engine | <2.5.13 | 2.5.13 |
redhat/ansible-engine | <2.6.10 | 2.6.10 |
redhat/ansible-engine | <2.7.4 | 2.7.4 |
pip/ansible | >=2.6.0a1<2.6.9 | 2.6.9 |
pip/ansible | >=0<2.5.12 | 2.5.12 |
pip/ansible | >=2.7.0a1<2.7.3 | 2.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-16859.
The severity of CVE-2018-16859 is medium, with a severity value of 4.4.
Ansible versions 2.5.13 up to exclusive, 2.6.10 up to exclusive, and 2.7.4 up to exclusive are affected.
A local user with administrator privileges can view EventLogs to discover plaintext passwords.
Yes, the fix for CVE-2018-16859 is available in Ansible versions 2.5.13, 2.6.10, and 2.7.4.