{"id":"CVE-2020-13881","details":"In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.","modified":"2026-04-11T21:19:50.038486Z","published":"2020-06-06T19:15:09.610Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00007.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00006.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4521-1/"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/11705-security-advisory-50"},{"type":"REPORT","url":"https://github.com/kravietz/pam_tacplus/issues/149"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2020/06/08/1"},{"type":"FIX","url":"https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kravietz/pam_tacplus","events":[{"introduced":"088dedd6d9b78b7dadd9f772b3d6f597a32d1548"},{"last_affected":"a21b05c1fe7ce99aa0ee01809c69b878ba90b122"},{"fixed":"4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0"}],"database_specific":{"versions":[{"introduced":"1.3.8"},{"last_affected":"1.5.1"}]}}],"versions":["1.3.8","1.3.9","v1.4.1","v1.5.0-beta.1","v1.5.1"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0","deprecated":false,"id":"CVE-2020-13881-867c5ea3","digest":{"line_hashes":["50493327747601994803184485470296647249","243304694626446301564069739451306751369","295339740349483353043127422527639009217","197291942669024249787144713228464574358","49610643164185859089051875687174081841"],"threshold":0.9},"target":{"file":"support.c"},"signature_type":"Line","signature_version":"v1"},{"source":"https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0","deprecated":false,"id":"CVE-2020-13881-be7678f1","digest":{"function_hash":"67182900991507665679698129543518705166","length":4144},"target":{"function":"_pam_parse","file":"support.c"},"signature_type":"Function","signature_version":"v1"}],"vanir_signatures_modified":"2026-04-11T21:19:50Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13881.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"fixed":"2020.1.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}