{"id":"CVE-2018-16876","details":"ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.","aliases":["GHSA-j569-fghw-f9rx","PYSEC-2019-141"],"modified":"2026-04-16T06:16:33.798689240Z","published":"2019-01-03T15:29:01.163Z","related":["SUSE-SU-2020:3309-1","openSUSE-SU-2019:0238-1","openSUSE-SU-2019:1125-1","openSUSE-SU-2019:1635-1","openSUSE-SU-2019:1858-1","openSUSE-SU-2024:10615-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3836"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3837"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3838"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0564"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0590"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106225"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3835"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4072-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4396"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16876"},{"type":"FIX","url":"https://github.com/ansible/ansible/pull/49569"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ansible/ansible","events":[{"introduced":"2c2dd1a1b3eca6248979e04e70afff6dd3fcf366"},{"fixed":"208ef773653303302eac8fc03859c6adf10a5656"},{"introduced":"8ce3bd6deaa0a0274a921c0137cbd804ffc312d0"},{"fixed":"5e03754e8fb391f42490142cfff2f8cb5fb1f6ad"},{"introduced":"0a07068054090d5b78b27496aa251be74c484b45"},{"fixed":"a771ed93ab09691e53184c809d88a0f1073ef82d"},{"introduced":"0"},{"last_affected":"2c2dd1a1b3eca6248979e04e70afff6dd3fcf366"},{"introduced":"0"},{"last_affected":"8ce3bd6deaa0a0274a921c0137cbd804ffc312d0"},{"introduced":"0"},{"last_affected":"0a07068054090d5b78b27496aa251be74c484b45"}],"database_specific":{"versions":[{"introduced":"2.5.0"},{"fixed":"2.5.14"},{"introduced":"2.6.0"},{"fixed":"2.6.11"},{"introduced":"2.7.0"},{"fixed":"2.7.5"},{"introduced":"0"},{"last_affected":"2.5"},{"introduced":"0"},{"last_affected":"2.6"},{"introduced":"0"},{"last_affected":"2.7"}]}}],"versions":["v2.5.0","v2.5.1","v2.5.10","v2.5.11","v2.5.12","v2.5.13","v2.5.2","v2.5.3","v2.5.4","v2.5.5","v2.5.6","v2.5.7","v2.5.8","v2.5.9","v2.6.0","v2.6.1","v2.6.10","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.6.9","v2.7.0","v2.7.1","v2.7.2","v2.7.3","v2.7.4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16876.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}