First published: Tue Oct 25 2022(Updated: )
A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | >=2.5.0<2.10.0 | |
Redhat Ansible Collection | <2.0.0 | |
Redhat Ansible Collection | >=2.1.0<5.1.0 | |
pip/ansible | >=2.5.0<7.0.0 | 7.0.0 |
debian/ansible | <=2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 | 7.7.0+dfsg-3+deb12u1 10.1.0+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3697 is a vulnerability found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module.
CVE-2022-3697 has a severity level of high.
CVE-2022-3697 affects Ansible when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module.
The remedy for CVE-2022-3697 is to upgrade to Ansible version 7.0.0 or newer.
More information about CVE-2022-3697 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-3697), [GitHub - Ansible Collections](https://github.com/ansible-collections/amazon.aws/pull/1199), [GitHub - Ansible](https://github.com/ansible/ansible/pull/35749).