CVE-2020-1746: Exposure of Sensitive Information to an Unauthorized Actor in ansible
5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.18492%
CWE
Published
4/20/2021
Updated
9/11/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ansible | pip | >= 2.8.0a1, < 2.8.11 | 2.8.11 |
ansible | pip | >= 2.9.0a1, < 2.9.7 | 2.9.7 |
ansible | pip | >= 2.7.0a1, < 2.7.17 | 2.7.17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from modules accepting a 'params' argument that circumvented Ansible's parameter handling. Both ldap_attr.py and ldap_entry.py's main functions merged user-provided 'params' into module parameters without proper security checks for 'bind_pw'. The patches removed 'params' and added explicit checks to block 'bind_pw' via this vector, confirming these functions were the exposure points.