Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. ansible
  4. ›
  5. CVE-2020-1753

CVE-2020-1753: Inclusion of Sensitive Information in Log Files

March 16, 2020 (updated August 7, 2021)

Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.

References

  • bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753
  • nvd.nist.gov/vuln/detail/CVE-2020-1753

Code Behaviors & Features

Detect and mitigate CVE-2020-1753 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.7.16, all versions starting from 2.8.0 up to 2.8.8, all versions starting from 2.9.0 up to 2.9.5

Fixed versions

  • 2.7.17
  • 2.8.9
  • 2.9.6

Solution

Upgrade to versions 2.7.17, 2.8.9, 2.9.6 or above.

Impact 5.5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

pypi/ansible/CVE-2020-1753.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:51 +0000.