All the vulnerabilites related to Red Hat - Ansible Automation Platform Execution Environments
cve-2024-8775
Vulnerability from cvelistv5
Published
2024-09-14 02:15
Modified
2024-11-11 17:38
Severity ?
EPSS score ?
Summary
Ansible-core: exposure of sensitive information in ansible vault files due to improper logging
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:8969 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2024-8775 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2312119 | issue-tracking, x_refsource_REDHAT |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8775", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T14:21:23.423396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:29:01.960Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ansible-builder-rhel8", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1.2.0-91", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ansible-builder-rhel9", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "3.0.1-95", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ee-29-rhel8", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "2.9.27-32", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ee-minimal-rhel8", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "2.16.13-1", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ee-minimal-rhel9", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "2.15.12-17", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:2" ], "defaultStatus": "affected", "packageName": "ansible-core", "product": "Red Hat Ansible Automation Platform 2", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux_ai:1" ], "defaultStatus": "affected", "packageName": "rhelai1/bootc-nvidia-rhel9", "product": "Red Hat Enterprise Linux AI (RHEL AI)", "vendor": "Red Hat" } ], "datePublic": "2024-09-13T08:35:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T17:38:13.547Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:8969", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:8969" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-8775" }, { "name": "RHBZ#2312119", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312119" } ], "timeline": [ { "lang": "en", "time": "2024-09-13T08:31:27.781000+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-09-13T08:35:00+00:00", "value": "Made public." } ], "title": "Ansible-core: exposure of sensitive information in ansible vault files due to improper logging", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-532: Insertion of Sensitive Information into Log File" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-8775", "datePublished": "2024-09-14T02:15:14.907Z", "dateReserved": "2024-09-13T09:06:07.367Z", "dateUpdated": "2024-11-11T17:38:13.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9902
Vulnerability from cvelistv5
Published
2024-11-06 09:56
Modified
2024-11-11 17:38
Severity ?
EPSS score ?
Summary
Ansible-core: ansible-core user may read/write unauthorized content
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:8969 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2024-9902 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2318271 | issue-tracking, x_refsource_REDHAT |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9902", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T14:20:56.915379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:21:06.565Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ansible-builder-rhel8", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1.2.0-91", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ansible-builder-rhel9", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "3.0.1-95", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ee-29-rhel8", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "2.9.27-32", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ee-minimal-rhel8", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "2.16.13-1", "versionType": "rpm" } ] }, { "collectionURL": "https://catalog.redhat.com/software/containers/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ], "defaultStatus": "affected", "packageName": "ansible-automation-platform/ee-minimal-rhel9", "product": "Ansible Automation Platform Execution Environments", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "2.15.12-17", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:2" ], "defaultStatus": "affected", "packageName": "core", "product": "Red Hat Ansible Automation Platform 2", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:openstack:17.1" ], "defaultStatus": "affected", "packageName": "openstack-ansible-core", "product": "Red Hat OpenStack Platform 17.1", "vendor": "Red Hat" } ], "credits": [ { "lang": "en", "value": "Red Hat would like to thank Matt Clay for reporting this issue." } ], "datePublic": "2024-11-06T06:11:25.611000+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user\u0027s home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T17:38:29.581Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:8969", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:8969" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-9902" }, { "name": "RHBZ#2318271", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318271" } ], "timeline": [ { "lang": "en", "time": "2024-10-12T02:41:32.581000+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-11-06T06:11:25.611000+00:00", "value": "Made public." } ], "title": "Ansible-core: ansible-core user may read/write unauthorized content", "workarounds": [ { "lang": "en", "value": "In the play that uses the user module with the key generation option,\nhave a prior task ensuring the public key does not exist for example:\n\n- name: avoid user exploit (change name depending on other options\nused in user task)\nfile: path=/home/{{username}}/.ssh/id_rsa.pub state=absent" } ], "x_redhatCweChain": "CWE-863: Incorrect Authorization" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-9902", "datePublished": "2024-11-06T09:56:54.505Z", "dateReserved": "2024-10-12T02:46:57.580Z", "dateUpdated": "2024-11-11T17:38:29.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }