{"api_version":"1","generated_at":"2026-04-22T22:48:01+00:00","cve":"CVE-2020-14330","urls":{"html":"https://cve.report/CVE-2020-14330","api":"https://cve.report/api/cve/CVE-2020-14330.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-14330","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-14330"},"summary":{"title":"CVE-2020-14330","description":"An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2020-09-11 18:15:00","updated_at":"2023-11-07 03:17:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330","refsource":"CONFIRM","tags":["Issue Tracking","Vendor Advisory"],"title":"1856815 – (CVE-2020-14330) CVE-2020-14330 Ansible: masked keys for uri module are exposed into content and json output","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2021/dsa-4950","name":"DSA-4950","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4950-1 ansible","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/ansible/ansible/issues/68400","name":"https://github.com/ansible/ansible/issues/68400","refsource":"MISC","tags":["Third Party Advisory"],"title":"uri module set string with masked content into content and json output · Issue #68400 · ansible/ansible · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-14330","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14330","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"14330","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"14330","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"14330","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-14330","qid":"178744","title":"Debian Security Update for ansible (DSA 4950-1)"},{"cve":"CVE-2020-14330","qid":"356251","title":"Amazon Linux Security Advisory for ansible : ALASANSIBLE2-2023-006"},{"cve":"CVE-2020-14330","qid":"500006","title":"Alpine Linux Security Update for ansible"},{"cve":"CVE-2020-14330","qid":"501347","title":"Alpine Linux Security Update for ansible-base"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-14330","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Red Hat","product":{"product_data":[{"product_name":"Ansible","version":{"version_data":[{"version_value":"2.10.0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532"}]}]},"references":{"reference_data":[{"url":"https://github.com/ansible/ansible/issues/68400","refsource":"MISC","name":"https://github.com/ansible/ansible/issues/68400"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330","refsource":"CONFIRM"},{"refsource":"DEBIAN","name":"DSA-4950","url":"https://www.debian.org/security/2021/dsa-4950"}]},"description":{"description_data":[{"lang":"eng","value":"An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality."}]},"impact":{"cvss":[[{"vectorString":"5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","version":"3.0"}]]}},"nvd":{"publishedDate":"2020-09-11 18:15:00","lastModifiedDate":"2023-11-07 03:17:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*","versionEndExcluding":"2.9.12","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"14330","Ordinal":"175560","Title":"CVE-2020-14330","CVE":"CVE-2020-14330","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"14330","Ordinal":"1","NoteData":"An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"14330","Ordinal":"2","NoteData":"2020-09-11","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"14330","Ordinal":"3","NoteData":"2021-08-07","Type":"Other","Title":"Modified"}]}}}