First published: Mon Jan 11 2021(Updated: )
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <0:2.9.18-1.el7ae | 0:2.9.18-1.el7ae |
redhat/ansible | <0:2.9.18-1.el8ae | 0:2.9.18-1.el8ae |
Redhat Ansible | <2.9.18 | |
Redhat Ansible Tower | =3.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
redhat/ansible | <2.9.18 | 2.9.18 |
pip/ansible | <2.9.18 | 2.9.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-20178.
The severity level of CVE-2021-20178 is medium.
The affected software includes Ansible, Ansible Tower, and Fedora.
An attacker can exploit this vulnerability to steal bitbucket_pipeline credentials.
To fix this vulnerability, update Ansible to version 2.9.18.