CVE-2014-4660: Ansible discloses credential information
(updated )
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list
, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the deb http://user:pass@server:port/
format.
References
- github.com/advisories/GHSA-5xm4-jmpw-p6j3
- github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
- github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08
- github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-202.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-4660
- security-tracker.debian.org/tracker/CVE-2014-4660
- web.archive.org/web/20200229060002/https://www.securityfocus.com/bid/68231
- www.openwall.com/lists/oss-security/2014/06/26/19
Detect and mitigate CVE-2014-4660 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →