First published: Mon Oct 05 2020(Updated: )
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | =2.10.1-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25635 is a vulnerability in Ansible Base that allows files to remain in the bucket after a playbook run, exposing sensitive data.
CVE-2020-25635 directly affects data confidentiality by allowing files to remain in the bucket, potentially exposing sensitive information.
The severity of CVE-2020-25635 is rated as medium with a severity value of 5.5.
To fix CVE-2020-25635, update to a version of Ansible Base that includes the fix for the issue.
You can find more information about CVE-2020-25635 on the Red Hat Bugzilla page and the GitHub issue page.