First published: Tue Mar 16 2021(Updated: )
A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <0:2.9.20-1.el7ae | 0:2.9.20-1.el7ae |
redhat/ansible | <0:2.9.20-1.el8ae | 0:2.9.20-1.el8ae |
redhat/redhat-virtualization-host | <0:4.4.7-20210715.1.el8_4 | 0:4.4.7-20210715.1.el8_4 |
redhat/ansible | <0:2.9.21-1.el8ae | 0:2.9.21-1.el8ae |
redhat/Red Hat Ansible Automation Platform | <1.2.2 | 1.2.2 |
redhat/Ansible Tower | <3.8.2 | 3.8.2 |
<1.2.2 | ||
<3.8.2 | ||
=32 | ||
=33 | ||
=34 | ||
Redhat Ansible | <1.2.2 | |
Redhat Ansible Tower | <3.8.2 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3447 is a vulnerability found in several ansible modules where parameters containing credentials, such as secrets, were being logged in plain-text.
CVE-2021-3447 has a severity level of medium.
Red Hat Ansible Automation Platform versions up to and exclusive to 1.2.2 are affected by CVE-2021-3447.
CVE-2021-3447 can be fixed by updating Ansible Tower to version up to and exclusive to 3.8.2.
Yes, you can find the security advisories related to CVE-2021-3447 at the following links: [access.redhat.com/errata/RHSA-2021:1079](https://access.redhat.com/errata/RHSA-2021:1079) and [bugzilla.redhat.com/show_bug.cgi?id=1939349](https://bugzilla.redhat.com/show_bug.cgi?id=1939349).