Information Exposure Through Log Files Affecting golang-github-prometheus-node_exporter package, versions <1.3.0-150000.3.15.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES150-GOLANGGITHUBPROMETHEUSNODEEXPORTER-3019850
- published 9 Sep 2022
- disclosed 8 Sep 2022
Introduced: 8 Sep 2022
CVE-2021-20191 Open this link in a new tabHow to fix?
Upgrade SLES:15.0 golang-github-prometheus-node_exporter to version 1.3.0-150000.3.15.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream golang-github-prometheus-node_exporter package and not the golang-github-prometheus-node_exporter package as distributed by SLES.
See How to fix? for SLES:15.0 relevant fixed versions and status.
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.