{"id":"CVE-2019-14846","details":"In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.","aliases":["GHSA-pm48-cvv2-29q5","PYSEC-2019-4"],"modified":"2026-04-16T04:35:03.841959354Z","published":"2019-10-08T19:15:10.400Z","related":["SUSE-SU-2020:3309-1","openSUSE-SU-2020:0513-1","openSUSE-SU-2020:0523-1","openSUSE-SU-2022:0081-1","openSUSE-SU-2024:10615-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0756"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3202"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4950"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3201"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3203"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3207"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846"},{"type":"FIX","url":"https://github.com/ansible/ansible/pull/63366"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ansible/ansible","events":[{"introduced":"0"},{"fixed":"9bdb89f740a87bcf760424577ce18a8f68d7a741"},{"introduced":"0a07068054090d5b78b27496aa251be74c484b45"},{"fixed":"71affa9d7c2e051951bd8cbd909e6c19203e1a2b"},{"introduced":"2611867fd1dc387ceaa0ffb8ce0f030aafc2a859"},{"fixed":"d778c59c43eea5801658dd993b771a314fc5511b"},{"introduced":"0"},{"last_affected":"2611867fd1dc387ceaa0ffb8ce0f030aafc2a859"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.6.20"},{"introduced":"2.7.0"},{"fixed":"2.7.14"},{"introduced":"2.8.0"},{"fixed":"2.8.6"},{"introduced":"0"},{"last_affected":"2.8.0"}]}}],"versions":["0.0.1","0.01","0.3","0.7","v1.0","v1.1","v1.2","v1.4.0","v1.6.0","v2.0.0-0.1.alpha1","v2.0.0-0.2.alpha2","v2.0.0-0.3.beta1","v2.0.0-0.4.beta2","v2.0.0-0.5.beta3","v2.6.0","v2.6.0a1","v2.6.0a2","v2.6.0rc1","v2.6.0rc2","v2.6.0rc3","v2.6.0rc4","v2.6.0rc5","v2.6.1","v2.6.10","v2.6.11","v2.6.12","v2.6.13","v2.6.14","v2.6.15","v2.6.16","v2.6.17","v2.6.18","v2.6.19","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.6.9","v2.7.0","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v2.8.0","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-14846.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}