First published: Wed Aug 16 2023(Updated: )
A logic flaw exists in Ansible Automation platform. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Redhat Ansible Automation Platform | =2.4 | |
Redhat Ansible Developer | =1.1 | |
Redhat Ansible Inside | =1.2 | |
Any of | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Ansible Automation Platform | =2.4 | |
Redhat Ansible Developer | =1.1 | |
Redhat Ansible Inside | =1.2 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
redhat/automation-eda-controller | <1.0.1 | 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4380 is a logic flaw vulnerability in Ansible that allows an attacker to retrieve credentials from the log.
CVE-2023-4380 affects the affected software by logging credentials in plaintext, leading to the loss of confidentiality, integrity, and availability.
The severity of CVE-2023-4380 is medium with a severity value of 6.3.
To fix CVE-2023-4380, update to version 1.0.1 of the 'automation-eda-controller' package or update to the latest version of the affected software.
The Common Weakness Enumeration (CWE) of CVE-2023-4380 is CWE-532.