cvelist/2023/4xxx/CVE-2023-4380.json

148 lines
6.1 KiB
JSON
Raw Normal View History

2023-08-16 11:00:35 +00:00
{
2023-10-04 15:00:33 +00:00
"data_version": "4.0",
2023-08-16 11:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-4380",
2023-10-04 15:00:33 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2023-08-16 11:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-10-04 15:00:33 +00:00
"value": "A logic flaw exists in Ansible. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insertion of Sensitive Information into Log File",
"cweId": "CWE-532"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "automation-eda-controller",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "1.0.1",
"status": "unaffected"
}
]
}
}
]
}
}
]
}
},
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.0.1-1.el8ap",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.0.1-1.el9ap",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:4693",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2023:4693"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4380",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-4380"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2232324",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2232324"
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
2023-08-16 11:00:35 +00:00
}
]
}
}