DescriptionA flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
Overall state of this security issue: Analysis
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
- SUSE-SU-2021:2121-1, published Tue Jun 22 16:19:05 UTC 2021
List of released packages
|Product(s)||Fixed package version(s)||References|
|HPE Helion Openstack 8|| ||Patchnames: |
|SUSE OpenStack Cloud 8|| ||Patchnames: |
|SUSE OpenStack Cloud Crowbar 8|| ||Patchnames: |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|HPE Helion OpenStack 8||ansible||Released|
|HPE Helion OpenStack 8||ansible1||In progress|
|SUSE Manager Client Tools Beta for SLE 15||ansible||Analysis|
|SUSE Manager Client Tools for SLE 15||ansible||Analysis|
|SUSE OpenStack Cloud 7||ansible||Analysis|
|SUSE OpenStack Cloud 8||ansible||Released|
|SUSE OpenStack Cloud 8||ansible1||In progress|
|SUSE OpenStack Cloud 9||ansible1||Analysis|
|SUSE OpenStack Cloud Crowbar 8||ansible||Released|