Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
{
"nvd_published_at": "2018-11-29T18:29:00Z",
"cwe_ids": [
"CWE-532"
],
"severity": "MODERATE",
"github_reviewed_at": "2024-04-22T22:07:45Z",
"github_reviewed": true
}