ID CVE-2019-14864
Summary Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:ansible:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.12:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.12:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.13:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.13:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.7.14:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.0:a1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.0:a1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.0:b2:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.0:b2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:b1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible:2.9.0:rc5:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible:2.9.0:rc5:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ansible_tower:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ansible_tower:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 22-04-2022 - 19:59)
Impact:
Exploitability:
CWE CWE-117
CAPEC
  • Web Logs Tampering
    Web Logs Tampering attacks involve an attacker injecting, deleting or otherwise tampering with the contents of web logs typically for the purposes of masking other malicious behavior. Additionally, writing malicious data to log files may target jobs, filters, reports, and other agents that process the logs in an asynchronous attack pattern. This pattern of attack is similar to "Log Injection-Tampering-Forging" except that in this case, the attack is targeting the logs of the web server and not the application.
  • Log Injection-Tampering-Forging
    This attack targets the log files of the target host. The attacker injects, manipulates or forges malicious log entries in the log file, allowing him to mislead a log audit, cover traces of attack, or perform other malicious actions. The target host is not properly controlling log access. As a result tainted data is resulting in the log files leading to a failure in accountability, non-repudiation and incident forensics capability.
  • Audit Log Manipulation
    The attacker injects, manipulates, deletes, or forges malicious log entries into the log file, in an attempt to mislead an audit of the log file or cover tracks of an attack. Due to either insufficient access controls of the log files or the logging mechanism, the attacker is able to perform such actions.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:N/A:N
redhat via4
rpms
  • ansible-0:2.7.15-1.el7ae
  • ansible-0:2.8.7-1.el7ae
  • ansible-0:2.8.7-1.el8ae
  • ansible-0:2.9.1-1.el7
  • ansible-0:2.9.1-1.el8
  • ansible-test-0:2.9.1-1.el7
  • ansible-test-0:2.9.1-1.el8
  • ansible-0:2.9.1-1.el7
  • ansible-0:2.9.1-1.el8
  • ansible-test-0:2.9.1-1.el7
  • ansible-test-0:2.9.1-1.el8
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864
misc
suse
  • openSUSE-SU-2020:0513
  • openSUSE-SU-2020:0523
Last major update 22-04-2022 - 19:59
Published 02-01-2020 - 15:15
Last modified 22-04-2022 - 19:59
Back to Top