11.1.0
11 years ago
19 days ago
Known vulnerabilities in the ansible package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure when passwords are included in the response. Exploiting this vulnerability could potentially allow for a man-in-the-middle attack, in which the perpetrator could intercept the response to obtain the password. How to fix Information Exposure? Upgrade | [2.4.0.0,2.5.0) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure where user credentials are disclosed by default in the traceback error message of How to fix Information Exposure? Upgrade | [,2.9.27) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Arbitrary Code Execution in How to fix Arbitrary Code Execution? Upgrade | [,2.5.6)[2.6.0,2.6.1) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. When a module has an How to fix Information Exposure? Upgrade | [,2.6.20)[2.7.0,2.7.14)[2.8.0,2.8.6) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Arbitrary Code Execution. It was found that inventory variables are loaded from current working directory when running ad-hoc commands which are under an attacker's control, allowing to run arbitrary code as a result. How to fix Arbitrary Code Execution? Upgrade | [2.6.0,2.6.1)[2.5.0,2.5.6)[,2.4.6.0) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Command Injection. If a user is trying to put templates in multi-line yaml strings and the facts being handled don't routinely include special template characters, then their controller will be vulnerable to a template injection through the facts used in template. How to fix Command Injection? Upgrade | [,2.9.23) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. How to fix Information Exposure? Upgrade | [,2.9.6) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. Logging with ansible is set at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process. How to fix Information Exposure? Upgrade | [2.9.0,2.9.12)[2.8.0,2.8.6)[2.10.0a1,2.10.0)[,2.7.14) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. In several modules parameters containing credentials are being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the How to fix Information Exposure? Upgrade | [0,2.8.20)[2.9.0,2.9.20) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. It leaks sensitive info such as secret values. This could lead in disclosing those credentials for every user which has access to the output of playbook execution. How to fix Information Exposure? Upgrade | [,2.8.19)[2.9.0,2.9.18) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. The return value of a specific module i.e. How to fix Information Exposure? Upgrade | [,2.8.19)[2.9.0,2.9.18)[2.10.0,2.10.7) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. How to fix Information Exposure? Upgrade | [,2.8.19)[2.9.0,2.9.18) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. A few different modules in Ansible-collection leaks sensitive data such as secret values. This could lead in disclosing those credentials for every user which has access to the output of playbook execution. How to fix Information Exposure? Upgrade | [,2.8.19)[2.9.0,2.9.18) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. When using uri module keys are not properly masked and sensitive data is exposed into content and json output. How to fix Information Exposure? Upgrade | [,2.8.14)[2.9.0,2.9.12) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. When using How to fix Information Exposure? Upgrade | [,2.8.14)[2.9.0,2.9.12) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Race Condition. This flaw refers to the incomplete fix for How to fix Race Condition? Upgrade | [2.9.0b1,2.9.10)[,2.8.13) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Remote Code Execution (RCE). It allows using ansible How to fix Remote Code Execution (RCE)? Upgrade | [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Race Condition. A race condition flaw exists when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in How to fix Race Condition? Upgrade | [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip). A flaw was found when using the How to fix Arbitrary File Write via Archive Extraction (Zip Slip)? Upgrade | [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Arbitrary Code Execution. Filenames in the How to fix Arbitrary Code Execution? Upgrade | [2.9.0,2.9.3)[2.8.0,2.8.8)[,2.7.16) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Arbitrary Code Injection. The How to fix Arbitrary Code Injection? Upgrade | [0,2.9.4) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Improper Input Validation. The fix made in Ansible for CVE-2019-10206 was not sufficient to resolve the problem. How to fix Improper Input Validation? Upgrade | [2.8.0,2.8.6)[2.7.0,2.7.14)[,2.6.20) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. It prompted passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them. How to fix Information Exposure? Upgrade | [,2.6.19)[2.7.0,2.7.13)[2.8.0,2.8.4) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. Splunk and Sumologic callback plugins leak sensitive data in logs. How to fix Information Exposure? Upgrade | [2.9.0b1,2.9.1)[2.8.0,2.8.7)[,2.7.15) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. A flaw was discovered in the way the returned module data is handled which may cause information disclosure. This was due to templating causing an unexpected key file to be set on a remote node. How to fix Information Exposure? Upgrade | [0,2.6.18)[2.8.0,2.8.2)[2.7.0,2.7.12) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure.
When a retry task run with How to fix Information Exposure? Upgrade ansible to version 2.5.14, 2.6.11, 2.7.5 or higher. | [,2.5.14)[2.6.0,2.6.11)[2.7.0,2.7.5) |
ansible is a simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. Execution of How to fix Information Exposure? Upgrade | [,2.5.13)[2.6.0,2.6.10)[2.7.0,2.7.4)[2.7.5,2.8.1) |
ansible is a radically simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. The How to fix Information Exposure? Upgrade | [,2.7.1) |
ansible is a radically simple IT automation system. Affected versions of this package are vulnerable to Information Exposure. If nodes become offline during the build, the How to fix Information Exposure? Upgrade | [,2.5.5) |