CVE-2014-4660: Ansible discloses credential information
(updated )
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the deb http://user:pass@server:port/ format.
References
- github.com/advisories/GHSA-5xm4-jmpw-p6j3
- github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
- github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08
- github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-202.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-4660
- security-tracker.debian.org/tracker/CVE-2014-4660
- web.archive.org/web/20200229060002/https://www.securityfocus.com/bid/68231
- www.openwall.com/lists/oss-security/2014/06/26/19
Code Behaviors & Features
Detect and mitigate CVE-2014-4660 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →