The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability CVE-2017-7550

Ansible: information disclosure via Jenkins_plugin Password Params

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Jenkins_plugin Password Params of Ansible, in order to obtain sensitive information.
Impacted software: Ansible Core, Fedora, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity of this computer vulnerability: 2/4.
Consequences of a hack: data reading.
Attacker's origin: user shell.
Creation date: 20/10/2017.
Références of this announce: CVE-2017-7550, FEDORA-2017-008017c9fe, FEDORA-2017-8bf1b0c692, openSUSE-SU-2017:2976-1, openSUSE-SU-2017:2978-1, RHSA-2017:2966-01, VIGILANCE-VUL-24190.

Description of the vulnerability

An attacker can bypass access restrictions to data via Jenkins_plugin Password Params of Ansible, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides applications vulnerabilities bulletins. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.