Description
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0019 | Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable. |
Github GHSA |
GHSA-v735-2pp6-h86r | Ansible Logs Passwords If PowerShell ScriptBlock is Enabled |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T10:32:54.246Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16859
No data.
Status : Modified
Published: 2018-11-29T18:29:00.537
Modified: 2024-11-21T03:53:27.863
Link: CVE-2018-16859
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA