Description


A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.

Related CPE's



o

redhat

enterprise_linux

2

References



https://github.com/ansible/ansible/issues/34144

ExploitIssue TrackingThird Party Advisory

Weaknesses



CWE-330


CWE-330

CVSS impact metrics


CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.5 · Medium

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2021-05-27T19:15:07.880

4 years ago

Last modified

2021-12-10T19:57:06.357

3 years ago