Skip to content

Ansible vulnerable to Insertion of Sensitive Information into Log File

Moderate severity GitHub Reviewed Published Sep 16, 2024 to the GitHub Advisory Database • Updated Nov 6, 2024

Package

pip ansible-core (pip)

Affected versions

<= 2.17.4

Patched versions

None

Description

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

References

Published by the National Vulnerability Database Sep 14, 2024
Published to the GitHub Advisory Database Sep 16, 2024
Reviewed Sep 16, 2024
Last updated Nov 6, 2024

Severity

Moderate

EPSS score

0.045%
(17th percentile)

Weaknesses

CVE ID

CVE-2024-8775

GHSA ID

GHSA-jpxc-vmjf-9fcj

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.