Ansible CVE-2018-16876 Remote Information Disclosure Vulnerability
BID:106225
CVE-2018-16876 |Info
Ansible CVE-2018-16876 Remote Information Disclosure Vulnerability
| Bugtraq ID: | 106225 |
| Class: | Input Validation Error |
| CVE: |
CVE-2018-16876 |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 07 2018 12:00AM |
| Updated: | Dec 07 2018 12:00AM |
| Credit: | The vendor reported this issue. |
| Vulnerable: |
Redhat Gluster Storage 3.0 Redhat Ceph Storage 3 Redhat Ceph Storage 2 AnsibleWorks ansible 2.7.4 AnsibleWorks ansible 2.7.3 AnsibleWorks ansible 2.7.2 AnsibleWorks ansible 2.7.1 AnsibleWorks ansible 2.7 AnsibleWorks ansible 2.6.10 AnsibleWorks ansible 2.6.9 AnsibleWorks ansible 2.6.8 AnsibleWorks ansible 2.6.7 AnsibleWorks ansible 2.6.6 AnsibleWorks ansible 2.6.5 AnsibleWorks ansible 2.5.13 AnsibleWorks ansible 2.5.12 AnsibleWorks ansible 2.5.11 AnsibleWorks ansible 2.5.10 |
| Not Vulnerable: |
AnsibleWorks ansible 2.7.5 AnsibleWorks ansible 2.6.11 AnsibleWorks ansible 2.5.14 |
Discussion
Ansible CVE-2018-16876 Remote Information Disclosure Vulnerability
Ansible is prone to an information-disclosure vulnerability.
Successfully exploiting this issue may allow an attacker to obtain sensitive information that may aid in further attacks.
Ansible is prone to an information-disclosure vulnerability.
Successfully exploiting this issue may allow an attacker to obtain sensitive information that may aid in further attacks.
Exploit / POC
Ansible CVE-2018-16876 Remote Information Disclosure Vulnerability
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Ansible CVE-2018-16876 Remote Information Disclosure Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.