Redhat

Ansible Automation Platform

37 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 06.02.2024 12:15:55
  • Zuletzt bearbeitet 04.11.2025 19:16:27

An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this iss...

  • EPSS 1.15%
  • Veröffentlicht 05.02.2024 21:15:11
  • Zuletzt bearbeitet 25.02.2026 19:29:16

A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

  • EPSS 0.72%
  • Veröffentlicht 18.12.2023 14:15:10
  • Zuletzt bearbeitet 06.12.2024 11:15:07

An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path...

  • EPSS 0.07%
  • Veröffentlicht 12.12.2023 22:15:22
  • Zuletzt bearbeitet 21.11.2024 08:42:26

A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating i...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 14.11.2023 23:15:12
  • Zuletzt bearbeitet 06.12.2024 11:15:07

A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being ...

Warnung Medienbericht Exploit
  • EPSS 94.39%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.07%
  • Veröffentlicht 04.10.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:41

A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the sys...

  • EPSS 0.4%
  • Veröffentlicht 04.10.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 08:18:25

An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.

  • EPSS 0.07%
  • Veröffentlicht 04.10.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:58

A logic flaw exists in Ansible Automation platform. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confid...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 25.10.2022 18:15:10
  • Zuletzt bearbeitet 07.05.2025 20:15:21

The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.