First published: Wed Sep 29 2021(Updated: )
Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Confluent Cp-ansible | =5.5.0 | |
Confluent Cp-ansible | =5.5.1 | |
Confluent Cp-ansible | =5.5.2 | |
Confluent Cp-ansible | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33923 is considered to have a medium severity due to the potential unauthorized access to sensitive information.
To fix CVE-2021-33923, update Confluent Ansible to version 6.0.1 or later.
CVE-2021-33923 affects Confluent Ansible versions 5.5.0, 5.5.1, 5.5.2, and 6.0.0.
CVE-2021-33923 can expose private keys and the state database to local attackers.
Mitigating CVE-2021-33923 without upgrading is not recommended, as proper permissions configuration may not fully eliminate the risk.