
Cloud Vulnerability DB
A community-led vulnerabilities database
A security flaw (CVE-2021-20180) was discovered in the Ansible module where credentials are disclosed in the console log by default when using the bitbucketpipelinevariable module. This vulnerability was identified in early 2021 and affects the Ansible automation platform (Debian Security, Red Hat CVE).
The vulnerability exists in the bitbucketpipelinevariable module of Ansible, where sensitive information such as secret values are not properly protected by the security feature and are exposed in the console log by default. This security issue affects multiple versions of Ansible Engine and Ansible Automation Platform (Red Hat Advisory).
The primary impact of this vulnerability is on confidentiality, as it allows attackers to steal bitbucket_pipeline credentials. Any user with access to the playbook execution output could potentially view these exposed sensitive credentials (Debian Security).
The vulnerability was addressed in Ansible version 2.9.18. Red Hat released security updates through multiple advisories including RHSA-2021:0663 and RHSA-2021:1079 to fix this issue. Users are advised to upgrade to the patched versions (Red Hat Advisory).
The vulnerability was acknowledged and credited to Abhijeet Kasurde from Red Hat, who discovered and reported the issue (Red Hat Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."