| Package | Installed | Affected | Info |
|---|
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 9.5.1 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 9.4.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 9.3.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 9.2.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 9.1.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg
[](https://pyup.io/repos/github/apihackers/docker-ansible/)
.. image:: https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg
:target: https://pyup.io/repos/github/apihackers/docker-ansible/
:alt: Python 3
<a href="https://pyup.io/repos/github/apihackers/docker-ansible/"><img src="https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/apihackers/docker-ansible/
{<img src="https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/apihackers/docker-ansible/]
https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg
[](https://pyup.io/repos/github/apihackers/docker-ansible/)
.. image:: https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg
:target: https://pyup.io/repos/github/apihackers/docker-ansible/
:alt: Updates
<a href="https://pyup.io/repos/github/apihackers/docker-ansible/"><img src="https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg(Updates)!:https://pyup.io/repos/github/apihackers/docker-ansible/
{<img src="https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/apihackers/docker-ansible/]