First published: Thu Jul 16 2020(Updated: )
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible-engine | <2.9.12 | 2.9.12 |
redhat/ansible-engine | <2.8.14 | 2.8.14 |
Redhat Ansible Engine | >=2.8.0<2.8.14 | |
Redhat Ansible Engine | >=2.9.0<2.9.12 | |
Debian Debian Linux | =10.0 | |
debian/ansible | 2.7.7+dfsg-1+deb10u1 2.7.7+dfsg-1+deb10u2 2.10.7+merged+base+2.10.8+dfsg-1 7.3.0+dfsg-1 7.7.0+dfsg-3 | |
pip/ansible | >=2.10.0a1<2.10.1rc2 | 2.10.1rc2 |
pip/ansible | >=2.9.0a1<2.9.12 | 2.9.12 |
pip/ansible | <2.8.14 | 2.8.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14332 is a vulnerability found in Ansible Engine when using module_args, allowing unauthorized users to read sensitive data.
CVE-2020-14332 poses a threat to confidentiality, as unauthorized users can exploit this vulnerability to access sensitive data.
The severity level of CVE-2020-14332 is medium with a CVSS score of 5.5.
Ansible Engine versions up to 2.9.12 and 2.8.14, as well as Redhat Ansible Engine versions 2.8.0 to 2.8.14 and 2.9.0 to 2.9.12 are affected by CVE-2020-14332.
To fix CVE-2020-14332, update Ansible Engine to version 2.9.12 or Redhat Ansible Engine to version 2.8.14.