Safety vulnerability ID: 54011
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password.
Latest version: 11.1.0
Radically simple IT automation
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application