5.5
CVSSv3

CVE-2021-3447

Published: 01/04/2021 Updated: 28/12/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions prior to 1.2.2 and Ansible Tower in versions prior to 3.8.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat ansible tower

redhat ansible

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #1014721 ansible: CVE-2021-3447 Package: src:ansible; Maintainer for src:ansible is Lee Garrett <debian@rocketjumpeu>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 10 Jul 2022 20:27:02 UTC Severity: important Tags: security Reply or subscribe to this bug Toggle useless ...
A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode These parameters were not protected by the no_log feature An attacker can take advantage of this information to steal ...
No description is available for this CVE ...
A security issue was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode These parameters were not protected by the no_log feature An attacker can take advantage of this informatio ...