Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI 2: CVE-2021-3447: Security patch for ansible (ALASANSIBLE2-2023-003)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Amazon Linux AMI 2: CVE-2021-3447: Security patch for ansible (ALASANSIBLE2-2023-003)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
04/01/2021
Created
09/28/2023
Added
09/28/2023
Modified
09/28/2023

Description

A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.

Solution(s)

  • amazon-linux-ami-2-upgrade-ansible
  • amazon-linux-ami-2-upgrade-ansible-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;