Search for vulnerabilities
Vulnerability details: VCID-qzhf-2cvf-aaaf
Vulnerability ID VCID-qzhf-2cvf-aaaf
Aliases CVE-2021-20178
GHSA-wv5p-gmmv-wh9v
PYSEC-2021-106
Summary A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0663
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0664
rhas Moderate https://access.redhat.com/errata/RHSA-2021:1079
rhas Moderate https://access.redhat.com/errata/RHSA-2021:2180
cvssv3 5.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20178.json
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.0004 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00048 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2021-20178
cvssv3.1 5.5 https://bugzilla.redhat.com/show_bug.cgi?id=1914774
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=1914774
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1914774
cvssv3.1 5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.5 https://github.com/advisories/GHSA-wv5p-gmmv-wh9v
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-wv5p-gmmv-wh9v
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-wv5p-gmmv-wh9v
generic_textual HIGH https://github.com/advisories/GHSA-wv5p-gmmv-wh9v
cvssv3.1 5.5 https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes
generic_textual HIGH https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes
generic_textual MODERATE https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes
cvssv3.1 5.5 https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,
generic_textual HIGH https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,
generic_textual MODERATE https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,
cvssv3.1 5.5 https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C
generic_textual HIGH https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C
generic_textual MODERATE https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C
cvssv3.1 5.5 https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc
generic_textual HIGH https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc
generic_textual MODERATE https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc
cvssv3.1 5.5 https://github.com/ansible-collections/community.general/pull/1635
generic_textual HIGH https://github.com/ansible-collections/community.general/pull/1635
generic_textual MODERATE https://github.com/ansible-collections/community.general/pull/1635
cvssv3.1 5.5 https://github.com/ansible-collections/community.general/pull/1635,
generic_textual MODERATE https://github.com/ansible-collections/community.general/pull/1635,
cvssv3.1 5.5 https://github.com/ansible-collections/community.general/pull/1635%2C
generic_textual MODERATE https://github.com/ansible-collections/community.general/pull/1635%2C
cvssv3.1 5.5 https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml
cvssv3.1 5.5 https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
cvssv3.1 6.3 https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
cvssv3.1 5.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
cvssv3.1 5.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
cvssv3.1 5.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
cvssv3.1 5.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
cvssv2 2.1 https://nvd.nist.gov/vuln/detail/CVE-2021-20178
cvssv3 5.5 https://nvd.nist.gov/vuln/detail/CVE-2021-20178
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2021-20178
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2021-20178
archlinux Medium https://security.archlinux.org/AVG-1437
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20178.json
https://api.first.org/data/v1/epss?cve=CVE-2021-20178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20178
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes
https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,
https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C
https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc
https://github.com/ansible-collections/community.general/pull/1635
https://github.com/ansible-collections/community.general/pull/1635,
https://github.com/ansible-collections/community.general/pull/1635%2C
https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml
https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/
1914774 https://bugzilla.redhat.com/show_bug.cgi?id=1914774
985753 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753
ASA-202102-9 https://security.archlinux.org/ASA-202102-9
AVG-1437 https://security.archlinux.org/AVG-1437
cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_tower:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVE-2021-20178 https://nvd.nist.gov/vuln/detail/CVE-2021-20178
GHSA-wv5p-gmmv-wh9v https://github.com/advisories/GHSA-wv5p-gmmv-wh9v
RHSA-2021:0663 https://access.redhat.com/errata/RHSA-2021:0663
RHSA-2021:0664 https://access.redhat.com/errata/RHSA-2021:0664
RHSA-2021:1079 https://access.redhat.com/errata/RHSA-2021:1079
RHSA-2021:2180 https://access.redhat.com/errata/RHSA-2021:2180
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20178.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=1914774
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/advisories/GHSA-wv5p-gmmv-wh9v
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible-collections/community.general/pull/1635
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible-collections/community.general/pull/1635,
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/ansible-collections/community.general/pull/1635%2C
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N Found at https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-20178
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-20178
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-20178
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.07252
EPSS Score 0.00031
Published At June 20, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.