First published: Tue Aug 08 2023(Updated: )
"When creating a new keypair the ec2_key module prints out the private key directly to the standard output. I wasn't able to find any way to disable this behavior in the module's documentation. This makes it unusable in any kind of public CI workflow such as GHA." Confirmed impacting all collection releases, and back to ansible-core 2.8 (did not test further back).
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Automation Platform | =2.0 | |
Redhat Ansible Collection | ||
pip/ansible-core | >=2.8.0<=2.15.2 | |
=2.0 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4237 is a vulnerability found in the Ansible Automation Platform that allows an attacker to fetch private keys from log files, compromising the system's confidentiality, integrity, and availability.
CVE-2023-4237 affects Redhat Ansible Automation Platform version 2.0.
CVE-2023-4237 affects Redhat Ansible Collection.
CVE-2023-4237 affects pip/ansible-core versions 2.8.0 to 2.15.2.
CVE-2023-4237 has a severity score of 7.8 (high).
To fix CVE-2023-4237, update to a patched version of the affected software.