CVE-2020-1753

Current Description

A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.

Basic Data

PublishedMarch 16, 2020
Last ModifiedJune 13, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-532
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatAnsible Engine********2.7.16
    2.3ApplicationRedhatAnsible Engine********2.8.02.8.8
    2.3ApplicationRedhatAnsible Engine********2.9.02.9.5
    2.3ApplicationRedhatAnsible Tower********3.3.4
    2.3ApplicationRedhatAnsible Tower********3.4.03.4.5
    2.3ApplicationRedhatAnsible Tower********3.5.03.5.5
    2.3ApplicationRedhatAnsible Tower********3.6.03.6.3

Vulnerable Software List

VendorProductVersions
Redhat Ansible Tower *
Redhat Ansible Engine *

References

NameSourceURLTags
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753CONFIRMIssue Tracking Vendor Advisory
https://github.com/ansible-collections/kubernetes/pull/51https://github.com/ansible-collections/kubernetes/pull/51CONFIRMExploit Patch Third Party Advisory
FEDORA-2020-3990f03ba3https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4FEDORA
FEDORA-2020-f80154b5b4https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUFEDORA
FEDORA-2020-1b6ce91e37https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQFEDORA
GLSA-202006-11https://security.gentoo.org/glsa/202006-11GENTOO