CVE-2018-16859

Current Description

Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.

Basic Data

PublishedNovember 29, 2018
Last ModifiedApril 03, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-532
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS 3 - Attack VectorLOCAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredHIGH
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactNONE
CVSS 3 - Availability ImpactNONE
CVSS 3 - Base Score4.4
CVSS 3 - Base SeverityMEDIUM
Exploitability Score0.8
Base SeverityMEDIUM

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatAnsible Engine********2.5.13
    2.3ApplicationRedhatAnsible Engine********2.6.02.6.10
    2.3ApplicationRedhatAnsible Engine********2.7.02.7.4
    2.3ApplicationRedhatAnsible Engine********2.7.52.8

Vulnerable Software List

VendorProductVersions
Redhat Ansible Engine *

References

NameSourceURLTags
openSUSE-SU-2019:1125http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.htmlSUSE
openSUSE-SU-2019:1635http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.htmlSUSE
openSUSE-SU-2019:1858http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.htmlSUSE
106004http://www.securityfocus.com/bid/106004BIDThird Party Advisory VDB Entry
RHSA-2018:3770https://access.redhat.com/errata/RHSA-2018:3770REDHATVendor Advisory
RHSA-2018:3771https://access.redhat.com/errata/RHSA-2018:3771REDHATVendor Advisory
RHSA-2018:3772https://access.redhat.com/errata/RHSA-2018:3772REDHATIssue Tracking Vendor Advisory
RHSA-2018:3773https://access.redhat.com/errata/RHSA-2018:3773REDHATVendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859CONFIRMIssue Tracking Vendor Advisory
https://github.com/ansible/ansible/pull/49142https://github.com/ansible/ansible/pull/49142CONFIRMPatch Third Party Advisory