Vulnerability Name: | CVE-2021-20228 (CCN-201040) | ||||||||||||||||||||||||||||||||
Assigned: | 2020-12-17 | ||||||||||||||||||||||||||||||||
Published: | 2021-04-06 | ||||||||||||||||||||||||||||||||
Updated: | 2022-08-05 | ||||||||||||||||||||||||||||||||
Summary: | A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20228 Source: CCN Type: Red Hat Bugzilla - Bug 1925002 (CVE-2021-20228) - CVE-2021-20228 ansible: basic.py no_log with fallback option Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1925002 Source: XF Type: UNKNOWN ansible-cve202120228-info-disc(201040) Source: CCN Type: ansible GIT Repository no_log mask suboption fallback values and defaults CVE-2021-20228 #73487 Source: MISC Type: Patch, Third Party Advisory https://github.com/ansible/ansible/pull/73487 Source: DEBIAN Type: Third Party Advisory DSA-4950 Source: CCN Type: IBM Security Bulletin 6455627 (Elastic Storage System) Ansible vulnerability affects IBM Elastic Storage System (CVE-2021-20228) Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-20228 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |