Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-10729


A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.


Published

2021-05-27T19:15:07.880

Last Modified

2024-11-21T04:55:56.860

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-330
  • Type: Primary
    CWE-330

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat ansible_engine < 2.9.6 Yes
Operating System redhat enterprise_linux 7.0 No
Operating System redhat enterprise_linux 8.0 No
Operating System debian debian_linux 10.0 Yes

References