{"api_version":"1","generated_at":"2026-04-23T15:08:32+00:00","cve":"CVE-2019-14858","urls":{"html":"https://cve.report/CVE-2019-14858","api":"https://cve.report/api/cve/CVE-2019-14858.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-14858","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-14858"},"summary":{"title":"CVE-2019-14858","description":"A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2019-10-14 15:15:00","updated_at":"2019-10-24 23:15:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://access.redhat.com/errata/RHSA-2019:3207","name":"RHSA-2019:3207","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html","name":"openSUSE-SU-2020:0513","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:0513-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html","name":"openSUSE-SU-2020:0523","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:0523-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14858","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14858","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1760593 – (CVE-2019-14858) CVE-2019-14858 ansible: sub parameters marked as no_log are not masked in certain failure scenarios","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3202","name":"RHSA-2019:3202","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2020:0756","name":"RHSA-2020:0756","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3203","name":"RHSA-2019:3203","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3201","name":"RHSA-2019:3201","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-14858","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14858","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"14858","vulnerable":"1","versionEndIncluding":"2.8.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"14858","vulnerable":"1","versionEndIncluding":"3.5.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_tower","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-14858","qid":"500005","title":"Alpine Linux Security Update for ansible"},{"cve":"CVE-2019-14858","qid":"501346","title":"Alpine Linux Security Update for ansible-base"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-14858","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Red Hat","product":{"product_data":[{"product_name":"Ansible","version":{"version_data":[{"version_value":"ansible_engine-2.x up to 2.8"},{"version_value":"ansible_tower-3.x up to 3.5"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-117"}]},{"description":[{"lang":"eng","value":"CWE-532"}]}]},"references":{"reference_data":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14858","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14858","refsource":"CONFIRM"},{"refsource":"REDHAT","name":"RHSA-2019:3203","url":"https://access.redhat.com/errata/RHSA-2019:3203"},{"refsource":"REDHAT","name":"RHSA-2019:3202","url":"https://access.redhat.com/errata/RHSA-2019:3202"},{"refsource":"REDHAT","name":"RHSA-2019:3207","url":"https://access.redhat.com/errata/RHSA-2019:3207"},{"refsource":"REDHAT","name":"RHSA-2019:3201","url":"https://access.redhat.com/errata/RHSA-2019:3201"},{"refsource":"REDHAT","name":"RHSA-2020:0756","url":"https://access.redhat.com/errata/RHSA-2020:0756"},{"refsource":"SUSE","name":"openSUSE-SU-2020:0513","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html"},{"refsource":"SUSE","name":"openSUSE-SU-2020:0523","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html"}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task."}]},"impact":{"cvss":[[{"vectorString":"7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.0"}]]}},"nvd":{"publishedDate":"2019-10-14 15:15:00","lastModifiedDate":"2019-10-24 23:15:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndIncluding":"2.8.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndIncluding":"3.5.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"14858","Ordinal":"154067","Title":"CVE-2019-14858","CVE":"CVE-2019-14858","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"14858","Ordinal":"1","NoteData":"A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"14858","Ordinal":"2","NoteData":"2019-10-14","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"14858","Ordinal":"3","NoteData":"2020-04-16","Type":"Other","Title":"Modified"}]}}}