First published: Wed Sep 29 2021(Updated: )
Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ansible | =5.5.0 | |
Ansible | =5.5.1 | |
Ansible | =5.5.2 | |
Ansible | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33924 has a high severity rating due to its potential for unauthorized access to sensitive information.
CVE-2021-33924 affects Confluent Ansible versions 5.5.0, 5.5.1, 5.5.2, and 6.0.0 by allowing incorrect access control through an auxiliary component.
To fix CVE-2021-33924, upgrade Confluent Ansible to a version that is not affected by this vulnerability.
Organizations using Confluent Ansible versions 5.5.0, 5.5.1, 5.5.2, or 6.0.0 are at risk from CVE-2021-33924.
Attackers exploiting CVE-2021-33924 can gain unauthorized access to sensitive information within affected versions of Confluent Ansible.