{"id":"CVE-2018-10855","details":"Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.","aliases":["GHSA-jwcc-j78w-j73w","PYSEC-2018-42"],"modified":"2026-04-16T06:18:19.314406304Z","published":"2018-07-03T01:29:00.580Z","related":["SUSE-SU-2018:4130-1","openSUSE-SU-2019:0238-1","openSUSE-SU-2024:10615-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2018:3788"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1948"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1949"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2022"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2184"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2585"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0054"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2079"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4072-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ansible/ansible","events":[{"introduced":"0"},{"fixed":"2a18883cb24b70043b5d719bb3c64c594670cad2"},{"introduced":"0"},{"last_affected":"5f6e1a70a6f879146b8504244d1b43f2e2059856"}],"database_specific":{"versions":[{"introduced":"2.4"},{"fixed":"2.4.5"},{"introduced":"0"},{"last_affected":"2.5.5"}]}}],"versions":["0.0.1","0.01","0.3","0.7","v1.0","v1.1","v1.2","v1.4.0","v1.6.0","v2.0.0-0.1.alpha1","v2.0.0-0.2.alpha2","v2.0.0-0.3.beta1","v2.0.0-0.4.beta2","v2.0.0-0.5.beta3","v2.4.0.0-0.1.rc1","v2.4.0.0-0.2.rc2","v2.4.0.0-0.3.rc3","v2.4.0.0-0.4.rc4","v2.4.0.0-0.5.rc5","v2.4.0.0-1","v2.4.1.0-0.1.beta1","v2.4.1.0-0.2.beta2","v2.4.1.0-0.3.rc1","v2.4.1.0-0.4.rc2","v2.4.1.0-1","v2.4.2.0-0.1.beta1","v2.4.2.0-0.2.beta2","v2.4.2.0-0.3.beta3","v2.4.2.0-0.4.beta4","v2.4.2.0-0.5.rc1","v2.4.2.0-1","v2.4.3-0.3.beta3","v2.4.3.0-0.1.beta1","v2.4.3.0-0.2.beta2","v2.4.3.0-0.4.rc1","v2.4.3.0-0.5.rc2","v2.4.3.0-0.6.rc3","v2.4.3.0-1","v2.4.4-0.1.beta1","v2.4.4-0.2.rc1","v2.4.4.0-0.3.rc2","v2.4.4.0-1","v2.4.5.0-0.1.rc1","v2.5.0","v2.5.0b1","v2.5.0b2","v2.5.0rc1","v2.5.0rc2","v2.5.0rc3","v2.5.1","v2.5.2","v2.5.3","v2.5.4","v2.5.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6"}]},{"events":[{"introduced":"0"},{"last_affected":"13"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10"}]},{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10855.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}