4.2 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
5.1 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for ‘become’ passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
[
{
"product": "ansible",
"vendor": "Red Hat",
"versions": [
{
"status": "affected",
"version": "2.8 and older"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
www.securityfocus.com/bid/106004
access.redhat.com/errata/RHSA-2018:3770
access.redhat.com/errata/RHSA-2018:3771
access.redhat.com/errata/RHSA-2018:3772
access.redhat.com/errata/RHSA-2018:3773
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859
github.com/ansible/ansible/pull/49142
4.2 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
5.1 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%