CVE-2021-3620
Ansible vulnerability analysis and mitigation

Overview

A flaw was found in Ansible Engine's ansible-connection module (CVE-2021-3620), where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The vulnerability was discovered in 2021 and affects Ansible Engine versions up to (excluding) 2.9.27 (NVD, Red Hat).

Technical details

The vulnerability has a CVSS v3.1 Base Score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The issue occurs when the ansible-connection module receives an unexpected response from set_options, causing sensitive connection parameters to be exposed in tracebacks that are displayed on screen and written to log files (GitHub Fix).

Impact

The highest threat from this vulnerability is to confidentiality, as it could expose sensitive information such as Ansible user credentials in error messages. This could potentially allow attackers with access to log files or error output to obtain authentication credentials (NVD).

Mitigation and workarounds

The vulnerability was fixed in Ansible Engine version 2.9.27. The fix involves creating a list of sensitive connection parameter names from ansible.constants, identifying sensitive values in the parameters before they are displayed, and using the moduleutils.common.parameters.removevalues function to hide them (GitHub Fix, Red Hat).

Additional resources


SourceThis report was generated using AI

Related Ansible vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-1313MEDIUM6.5
  • GrafanaGrafana
  • grafana-prometheus
NoYesMar 26, 2024
CVE-2024-9902MEDIUM6.3
  • AnsibleAnsible
  • ansible
NoYesNov 06, 2024
CVE-2024-11079MEDIUM5.5
  • AnsibleAnsible
  • ansible
NoYesNov 12, 2024
CVE-2024-8775MEDIUM5.5
  • AnsibleAnsible
  • ansible-doc
NoYesSep 14, 2024
CVE-2023-6152MEDIUM5.4
  • GrafanaGrafana
  • POS_Image-JeOS7
NoYesFeb 13, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management