VYPR
Moderate severityNVD Advisory· Published Mar 16, 2020· Updated Aug 4, 2024

CVE-2020-1753

CVE-2020-1753

Description

A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ansiblePyPI
>= 2.7.0a1, < 2.7.182.7.18
ansiblePyPI
>= 2.8.0a1, < 2.8.122.8.12
ansiblePyPI
>= 2.9.0a1, < 2.9.72.9.7

Affected products

1

Patches

3
273d8538dbe5

document danger of kubectl options (#68195)

https://github.com/ansible/ansibleBrian CocaApr 3, 2020via ghsa
1 file changed · +5 0
  • lib/ansible/plugins/connection/kubectl.py+5 0 modified
    @@ -65,6 +65,7 @@
           kubectl_extra_args:
             description:
               - Extra arguments to pass to the kubectl command line.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
             default: ''
             vars:
               - name: ansible_kubectl_extra_args
    @@ -109,6 +110,8 @@
           kubectl_password:
             description:
               - Provide a password for authenticating with the API.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
    +            We recommend using the file based authentication options instead.
             default: ''
             vars:
               - name: ansible_kubectl_password
    @@ -117,6 +120,8 @@
           kubectl_token:
             description:
               - API authentication bearer token.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
    +            We recommend using the file based authentication options instead.
             vars:
               - name: ansible_kubectl_token
               - name: ansible_kubectl_api_key
    
04ba05e003b2

document danger of kubectl options (#68195)

https://github.com/ansible/ansibleBrian CocaApr 3, 2020via ghsa
1 file changed · +5 0
  • lib/ansible/plugins/connection/kubectl.py+5 0 modified
    @@ -65,6 +65,7 @@
           kubectl_extra_args:
             description:
               - Extra arguments to pass to the kubectl command line.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
             default: ''
             vars:
               - name: ansible_kubectl_extra_args
    @@ -109,6 +110,8 @@
           kubectl_password:
             description:
               - Provide a password for authenticating with the API.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
    +            We recommend using the file based authentication options instead.
             default: ''
             vars:
               - name: ansible_kubectl_password
    @@ -117,6 +120,8 @@
           kubectl_token:
             description:
               - API authentication bearer token.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
    +            We recommend using the file based authentication options instead.
             vars:
               - name: ansible_kubectl_token
               - name: ansible_kubectl_api_key
    
137caed836ef

document danger of kubectl options (#68195)

https://github.com/ansible/ansibleBrian CocaApr 3, 2020via ghsa
1 file changed · +5 0
  • lib/ansible/plugins/connection/kubectl.py+5 0 modified
    @@ -65,6 +65,7 @@
           kubectl_extra_args:
             description:
               - Extra arguments to pass to the kubectl command line.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
             default: ''
             vars:
               - name: ansible_kubectl_extra_args
    @@ -108,6 +109,8 @@
           kubectl_password:
             description:
               - Provide a password for authenticating with the API.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
    +            We recommend using the file based authentication options instead.
             default: ''
             vars:
               - name: ansible_kubectl_password
    @@ -116,6 +119,8 @@
           kubectl_token:
             description:
               - API authentication bearer token.
    +          - Please be aware that this passes information directly on the command line and it could expose sensitive data.
    +            We recommend using the file based authentication options instead.
             vars:
               - name: ansible_kubectl_token
               - name: ansible_kubectl_api_key
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

17

News mentions

0

No linked articles in our index yet.