First published: Fri Jan 29 2021(Updated: )
A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <0:2.9.18-1.el7ae | 0:2.9.18-1.el7ae |
redhat/ansible | <0:2.9.18-1.el8ae | 0:2.9.18-1.el8ae |
Redhat Ansible Engine | =2.9.18 | |
Redhat Ansible Automation Platform | =1.2 | |
Redhat Ansible Engine | =2.0 | |
Redhat Ansible Engine | =2.9 | |
Redhat Ansible Tower | =3.0 | |
Debian Debian Linux | =10.0 | |
debian/ansible | 2.7.7+dfsg-1+deb10u1 2.7.7+dfsg-1+deb10u2 2.10.7+merged+base+2.10.8+dfsg-1 7.3.0+dfsg-1 7.7.0+dfsg-3 | |
redhat/ansible-engine | <2.9.18 | 2.9.18 |
pip/ansible | <2.8.19rc1 | 2.8.19rc1 |
pip/ansible | >=2.9.0a1<2.9.18rc1 | 2.9.18rc1 |
pip/ansible | >=2.10.0a1<2.10.6rc1 | 2.10.6rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-20228 is a vulnerability in Ansible Engine where sensitive information is not masked by default and can be obtained by an attacker.
CVE-2021-20228 has a severity rating of 7.5 (high).
Ansible Engine versions from 2.8.0 to 2.8.19, 2.9.0 to 2.9.18, and 2.10.0 to 2.10.7 are affected. Redhat Ansible Engine 2.9.18 and Ansible versions 0:2.9.18-1.el7ae and 0:2.9.18-1.el8ae are also affected.
To fix CVE-2021-20228, update your Ansible Engine to version 2.8.19, 2.9.18, or 2.10.7.
You can find more information about CVE-2021-20228 on the NIST National Vulnerability Database (NVD) website and the relevant GitHub pull requests (PR #73487 and PR #73492).