In Ansible Engine, when using uri module keys are not properly masked and sensitive data is exposed into content and json output.
External References: https://github.com/ansible/ansible/issues/68400
Mitigation: There is no mitigation for this issue.
Acknowledgments: Name: Hung Luong
Created ansible tracking bugs for this issue: Affects: epel-all [bug 1857185] Affects: fedora-all [bug 1857186]
Created ansible tracking bugs for this issue: Affects: openstack-rdo [bug 1859536]
The correct upstream PR which fixes this particular issue is: https://github.com/ansible/ansible/pull/70762/
This has been fixed in 2.9.12 upstream and 2.9.13 downstream.
Statement: Red Hat Ansible Engine 2.9.12 (downstream) and Ansible Engine 2.9.11 (upstream), as well as previous versions are affected by this flaw. Ansible Engine 2.9.12 version (upstream) on towards fixes the issue for upstream and Red Hat Ansible Engine 2.9.13 version is fixed (downstream). Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 ships the affected version of Ansible, but they no longer maintain their own version of Ansible. Both the products will consume fixes directly from the Ansible repository. As we still ship Ansible separately for Ceph on Ubuntu, a future update may address this issue. In Red Hat OpenStack Platform, because ansible is not directly customer exposed (so that the flaw could not be exploited) and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP ansible package. Note: Red Hat Open Stack Platform 15 and newer consume fixes directly from the Ansible repository.