VYPR
Moderate severityNVD Advisory· Published Jan 2, 2020· Updated Aug 5, 2024

CVE-2019-14864

CVE-2019-14864

Description

Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ansiblePyPI
>= 2.7.0a1, < 2.7.152.7.15
ansiblePyPI
>= 2.8.0a1, < 2.8.72.8.7
ansiblePyPI
>= 2.9.0a1, < 2.9.12.9.1

Affected products

1

Patches

4
75288a89d005

Callback: removing args from task_fields from Sumologic and Splunk plugin(#63527) (#64748)

https://github.com/ansible/ansibleMatt DavisNov 13, 2019via ghsa
3 files changed · +8 0
  • changelogs/fragments/63522-remove-args-from-sumologic-and-splunk-callbacks.yml+2 0 added
    @@ -0,0 +1,2 @@
    +bugfixes:
    +  - '**security issue** - Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)'
    
  • lib/ansible/plugins/callback/splunk.py+3 0 modified
    @@ -98,6 +98,9 @@ def send_event(self, url, authtoken, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
  • lib/ansible/plugins/callback/sumologic.py+3 0 modified
    @@ -89,6 +89,9 @@ def send_event(self, url, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
050f92f96054

[2.8] Callback: removing args from task_fields from Sumologic and Splunk plugin (#64273)

https://github.com/ansible/ansibleAbhijeet KasurdeNov 12, 2019via ghsa
3 files changed · +8 0
  • changelogs/fragments/63522-remove-args-from-sumologic-and-splunk-callbacks.yml+2 0 added
    @@ -0,0 +1,2 @@
    +bugfixes:
    +  - '**security issue** - Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)'
    
  • lib/ansible/plugins/callback/splunk.py+3 0 modified
    @@ -98,6 +98,9 @@ def send_event(self, url, authtoken, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
  • lib/ansible/plugins/callback/sumologic.py+3 0 modified
    @@ -89,6 +89,9 @@ def send_event(self, url, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
a0ec2976b271

[2.9] Callback: removing args from task_fields from Sumologic and Splunk plugin (#64274)

https://github.com/ansible/ansibleAbhijeet KasurdeNov 12, 2019via ghsa
3 files changed · +8 0
  • changelogs/fragments/63522-remove-args-from-sumologic-and-splunk-callbacks.yml+2 0 added
    @@ -0,0 +1,2 @@
    +bugfixes:
    +  - '**security issue** - Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)'
    
  • lib/ansible/plugins/callback/splunk.py+3 0 modified
    @@ -98,6 +98,9 @@ def send_event(self, url, authtoken, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
  • lib/ansible/plugins/callback/sumologic.py+3 0 modified
    @@ -89,6 +89,9 @@ def send_event(self, url, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
c76e074e4c71

Callback: removing args from task_fields from Sumologic and Splunk plugin(#63527)

https://github.com/ansible/ansiblePatrick O'BrienNov 1, 2019via ghsa
3 files changed · +8 0
  • changelogs/fragments/63522-remove-args-from-sumologic-and-splunk-callbacks.yml+2 0 added
    @@ -0,0 +1,2 @@
    +bugfixes:
    +  - '**security issue** - Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)'
    
  • lib/ansible/plugins/callback/splunk.py+3 0 modified
    @@ -98,6 +98,9 @@ def send_event(self, url, authtoken, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    
  • lib/ansible/plugins/callback/sumologic.py+3 0 modified
    @@ -89,6 +89,9 @@ def send_event(self, url, state, result, runtime):
             else:
                 ansible_role = None
     
    +        if 'args' in result._task_fields:
    +            del result._task_fields['args']
    +
             data = {}
             data['uuid'] = result._task._uuid
             data['session'] = self.session
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

16

News mentions

0

No linked articles in our index yet.