| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 5.1.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| ansible | 5.1.0 | >=2.5.0a1,<7.0.0 |
show A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 5.0.1 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| ansible | 5.0.1 | >=2.5.0a1,<7.0.0 |
show A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| Package | Installed | Affected | Info |
|---|
https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg
[](https://pyup.io/repos/github/apihackers/docker-ansible/)
.. image:: https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg
:target: https://pyup.io/repos/github/apihackers/docker-ansible/
:alt: Python 3
<a href="https://pyup.io/repos/github/apihackers/docker-ansible/"><img src="https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/apihackers/docker-ansible/
{<img src="https://pyup.io/repos/github/apihackers/docker-ansible/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/apihackers/docker-ansible/]
https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg
[](https://pyup.io/repos/github/apihackers/docker-ansible/)
.. image:: https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg
:target: https://pyup.io/repos/github/apihackers/docker-ansible/
:alt: Updates
<a href="https://pyup.io/repos/github/apihackers/docker-ansible/"><img src="https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg(Updates)!:https://pyup.io/repos/github/apihackers/docker-ansible/
{<img src="https://pyup.io/repos/github/apihackers/docker-ansible/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/apihackers/docker-ansible/]