| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 9.0.1 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.6.1 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.6.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.5.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.4.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 2.9.27 | >=2.4.0.0,<2.10.0 |
show Affected versions of the `ansible` package are vulnerable to Improper Output Neutralization for Logs due to insufficient sanitization of sensitive data in log outputs. The vulnerability exists in the `uri` module, where sensitive information such as keys can be inadvertently logged in both content and JSON outputs. An attacker can exploit this vulnerability by accessing the logs to obtain sensitive data, compromising the confidentiality of playbooks and potentially exposing private keys used by other users. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| ansible | 2.9.27 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| ansible | 2.9.27 | >=2.5.0a1,<7.0.0 |
show A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.3.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 2.9.27 | >=2.4.0.0,<2.10.0 |
show Affected versions of the `ansible` package are vulnerable to Improper Output Neutralization for Logs due to insufficient sanitization of sensitive data in log outputs. The vulnerability exists in the `uri` module, where sensitive information such as keys can be inadvertently logged in both content and JSON outputs. An attacker can exploit this vulnerability by accessing the logs to obtain sensitive data, compromising the confidentiality of playbooks and potentially exposing private keys used by other users. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| ansible | 2.9.27 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| ansible | 2.9.27 | >=2.5.0a1,<7.0.0 |
show A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.2.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 2.9.27 | >=2.4.0.0,<2.10.0 |
show Affected versions of the `ansible` package are vulnerable to Improper Output Neutralization for Logs due to insufficient sanitization of sensitive data in log outputs. The vulnerability exists in the `uri` module, where sensitive information such as keys can be inadvertently logged in both content and JSON outputs. An attacker can exploit this vulnerability by accessing the logs to obtain sensitive data, compromising the confidentiality of playbooks and potentially exposing private keys used by other users. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| ansible | 2.9.27 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| ansible | 2.9.27 | >=2.5.0a1,<7.0.0 |
show A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| ansible | 2.9.27 | >=2.4.0.0,<2.10.0 |
show Affected versions of the `ansible` package are vulnerable to Improper Output Neutralization for Logs due to insufficient sanitization of sensitive data in log outputs. The vulnerability exists in the `uri` module, where sensitive information such as keys can be inadvertently logged in both content and JSON outputs. An attacker can exploit this vulnerability by accessing the logs to obtain sensitive data, compromising the confidentiality of playbooks and potentially exposing private keys used by other users. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| ansible | 2.9.27 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| ansible | 2.9.27 | >=2.5.0a1,<7.0.0 |
show A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| ansible | 2.9.27 | <2.10.5 |
show A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality. This CVE affects community.aws before 1.2.1 and Ansible-build-data ships this dependency on versions before 2.10.5. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.1.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 8.0.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| click | 7.1.2 | <8.0.0 |
show Click 8.0.0 uses 'mkstemp()' instead of the deprecated & insecure 'mktemp()'. https://github.com/pallets/click/issues/1752 |
| ansible | 7.6.0 | <12.2.0 |
show Affected versions of the Ansible package are vulnerable to Information Disclosure due to improper redaction of sensitive credential fields in verbose log output. The community.general.keycloak_user module logs the credentials[].value parameter in plaintext when Ansible is executed with high verbosity (for example, -vvv), because this field is not marked with the no_log protection that is applied to other password parameters such as auth_password. |
https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/python-3-shield.svg
[](https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/)
.. image:: https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/python-3-shield.svg
:target: https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/
:alt: Python 3
<a href="https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/"><img src="https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/
{<img src="https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/]
https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/shield.svg
[](https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/)
.. image:: https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/shield.svg
:target: https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/
:alt: Updates
<a href="https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/"><img src="https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/shield.svg(Updates)!:https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/
{<img src="https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/inhumantsar/python-ansible-vault-rekey/]