Show filters
158 Total Results
Displaying 41-50 of 158
Sort by:
Attacker Value
Unknown
CVE-2021-3589
Disclosure Date: March 23, 2022 (last updated October 07, 2023)
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
0
Attacker Value
Unknown
CVE-2021-20180
Disclosure Date: March 16, 2022 (last updated October 07, 2023)
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2021-3620
Disclosure Date: March 03, 2022 (last updated October 07, 2023)
A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2021-33924
Disclosure Date: September 29, 2021 (last updated November 28, 2024)
Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information.
0
Attacker Value
Unknown
CVE-2021-33923
Disclosure Date: September 29, 2021 (last updated November 28, 2024)
Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database).
0
Attacker Value
Unknown
CVE-2021-3583
Disclosure Date: September 22, 2021 (last updated November 08, 2023)
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2020-1716
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in the ceph-ansible playbook where it contained hardcoded passwords that were being used as default passwords while deploying Ceph services. Any authenticated attacker can abuse this flaw to brute-force Ceph deployments, and gain administrator access to Ceph clusters via the Ceph dashboard to initiate read, write, and delete Ceph clusters and also modify Ceph cluster configurations. Versions before ceph-ansible 6.0.0alpha1 are affected.
0
Attacker Value
Unknown
CVE-2020-14328
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
A flaw was found in Ansible Tower in versions before 3.7.2. A Server Side Request Forgery flaw can be abused by supplying a URL which could lead to the server processing it connecting to internal services or exposing additional internal services and more particularly retrieving full details in case of error. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-14329
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
A data exposure flaw was found in Ansible Tower in versions before 3.7.2, where sensitive data can be exposed from the /api/v2/labels/ endpoint. This flaw allows users from other organizations in the system to retrieve any label from the organization and also disclose organization names. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2020-14327
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
A Server-side request forgery (SSRF) flaw was found in Ansible Tower in versions before 3.6.5 and before 3.7.2. Functionality on the Tower server is abused by supplying a URL that could lead to the server processing it. This flaw leads to the connection to internal services or the exposure of additional internal services by abusing the test feature of lookup credentials to forge HTTP/HTTPS requests from the server and retrieving the results of the response.
0