Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "2.5.13"
},
{
"introduced": "2.6.0"
},
{
"fixed": "2.6.10"
},
{
"introduced": "2.7.0"
},
{
"fixed": "2.7.4"
},
{
"introduced": "2.7.5"
},
{
"last_affected": "2.8"
}
]
}