CVE-2021-3681
low-risk
Published 2022-04-18
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (2)
Ansible Galaxy
Affected Vendors
References (4)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1989407
Third Party Advisory
https://github.com/ansible/galaxy/issues/1977
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1989407
Third Party Advisory
https://github.com/ansible/galaxy/issues/1977
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low