
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-1739 is a security vulnerability discovered in Ansible versions 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior. The vulnerability occurs when a password is set with the argument "password" of the SVN module, which is then exposed on the command line, potentially disclosing sensitive information to other users within the same node (CVE Mitre, NVD).
The vulnerability exists in the SVN module of Ansible where passwords specified using the 'password' parameter are passed directly to the SVN command line. This implementation flaw allows the password to be visible in the process command line, which can be accessed through the procfs interface by reading the cmdline file of the particular process ID (GitHub Issue).
The vulnerability allows local users on the same system to potentially discover SVN passwords by reading the command line arguments of Ansible processes through the procfs interface. This could lead to unauthorized access to version control systems and compromise of sensitive repositories (Red Hat Bugzilla).
The vulnerability has been fixed in Ansible versions 2.7.17, 2.8.11, and 2.9.7. As a workaround before updating, users can provide the password via stdin instead of using the 'password' parameter of the subversion module (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."