Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password.
Acknowledgments: Name: Igor Turovsky
OpenShift Enterprise version 3.8 and later use Ansible from the Ansible repository. Notifications and fixes will come from this.
This issue affects the versions of ansible as shipped with OpenStack. However, this flaw is not known to be exploitable under any supported scenario in OpenStack as it specifically affects Microsoft Windows systems.
External References: https://github.com/ansible/ansible/pull/49142
Previous description of this flaw was inaccurate. Disregard it and consider the following one: Execution of Ansible content on Windows platforms with Powershell 5 or higher may disclose sensitive execution details (including 'become' passwords, Ansible module arguments, and return values) via Powershell's "suspicious scriptblock logging" feature, which is enabled by default. The details are logged to the Powershell Operational log, which is visible to all authenticated users by default. Ansible Engine 2.7 and older are believed to be vulnerable.
This description should set on the doctext in order to update and correct the CVE description at mitre. Eric, could you review that?
In reply to comment #12: > This description should set on the doctext in order to update and correct > the CVE description at mitre. Eric, could you review that? Updated.
This issue has been addressed in the following products: Red Hat Ansible Engine 2.5 for RHEL 7 Via RHSA-2018:3770 https://access.redhat.com/errata/RHSA-2018:3770
This issue has been addressed in the following products: Red Hat Ansible Engine 2.7 for RHEL 7 Via RHSA-2018:3773 https://access.redhat.com/errata/RHSA-2018:3773
This issue has been addressed in the following products: Red Hat Ansible Engine 2.6 for RHEL 7 Via RHSA-2018:3771 https://access.redhat.com/errata/RHSA-2018:3771
This issue has been addressed in the following products: Red Hat Ansible Engine 2 for RHEL 7 Via RHSA-2018:3772 https://access.redhat.com/errata/RHSA-2018:3772
Statement: CloudForms and Satellite 6 are not affected by this issue, since Microsoft Windows is not a supported platform.