7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
5.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.1%
Ansible “User” module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.
[
{
"product": "Ansible",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
www.securityfocus.com/bid/105700
access.redhat.com/errata/RHSA-2018:3460
access.redhat.com/errata/RHSA-2018:3461
access.redhat.com/errata/RHSA-2018:3462
access.redhat.com/errata/RHSA-2018:3463
access.redhat.com/errata/RHSA-2018:3505
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16837
lists.debian.org/debian-lts-announce/2018/11/msg00012.html
usn.ubuntu.com/4072-1/
www.debian.org/security/2019/dsa-4396
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
5.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.1%