Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
2018-11-29T18:29:00.537
2024-11-21T03:53:27.863
Modified
CVSSv3.0: 4.2 (MEDIUM)
AV:L/AC:L/Au:N/C:P/I:N/A:N
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | ansible_engine | < 2.5.13 | Yes |
Application | redhat | ansible_engine | < 2.6.10 | Yes |
Application | redhat | ansible_engine | < 2.7.4 | Yes |
Application | redhat | ansible_engine | ≤ 2.8 | Yes |