Skip to content

x/vulndb: potential Go vuln in github.com/ansible/ansible: CVE-2018-16859 #2213

New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Closed
tatianab opened this issue Nov 8, 2023 · 1 comment
Labels
excluded: LEGACY_FALSE_POSITIVE (DO NOT USE) Vulnerability marked as false positive before we introduced the triage process

Comments

@tatianab
Copy link
Contributor

tatianab commented Nov 8, 2023

CVE-2018-16859 references github.com/ansible/ansible, which may be a Go module.

Description:
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.

References:

Cross references:
No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/ansible/ansible
      vulnerable_at: 2.15.5+incompatible
      packages:
        - package: ansible
cves:
    - CVE-2018-16859
references:
    - fix: https://github.com/ansible/ansible/pull/49142
    - web: https://access.redhat.com/errata/RHSA-2018:3770
    - web: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859
    - web: https://access.redhat.com/errata/RHSA-2018:3771
    - web: http://www.securityfocus.com/bid/106004
    - web: https://access.redhat.com/errata/RHSA-2018:3773
    - web: https://access.redhat.com/errata/RHSA-2018:3772
    - web: http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
    - web: http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
    - web: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html

@tatianab tatianab added the excluded: LEGACY_FALSE_POSITIVE (DO NOT USE) Vulnerability marked as false positive before we introduced the triage process label Nov 8, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/540721 mentions this issue: data/excluded: batch add 135 excluded reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: LEGACY_FALSE_POSITIVE (DO NOT USE) Vulnerability marked as false positive before we introduced the triage process
Projects
None yet
Development

No branches or pull requests

2 participants