{"id":"UBUNTU-CVE-2020-14330","details":"An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.","modified":"2025-10-14T16:49:38Z","published":"2020-09-11T18:15:00Z","upstream":["CVE-2020-14330"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-14330"},{"type":"REPORT","url":"https://github.com/ansible/ansible/issues/68400"},{"type":"REPORT","url":"https://github.com/ansible/ansible/pull/69653"},{"type":"REPORT","url":"https://github.com/ansible/ansible/commit/e0f25a2b1f9e6c21f751ba0ed2dc2eee2152983e"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2020-14330"}],"affected":[{"package":{"name":"ansible","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/ansible@1.5.4+dfsg-1ubuntu0.1~esm3?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1+dfsg-1","1.3.4+dfsg-1","1.4.0+dfsg-1","1.4.1+dfsg-1","1.4.3+dfsg-1","1.4.4+dfsg-1","1.5.4+dfsg-1","1.5.4+dfsg-1ubuntu0.1~esm1","1.5.4+dfsg-1ubuntu0.1~esm2","1.5.4+dfsg-1ubuntu0.1~esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.5.4+dfsg-1ubuntu0.1~esm3","binary_name":"ansible"},{"binary_version":"1.5.4+dfsg-1ubuntu0.1~esm3","binary_name":"ansible-fireball"},{"binary_version":"1.5.4+dfsg-1ubuntu0.1~esm3","binary_name":"ansible-node-fireball"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-14330.json"}},{"package":{"name":"ansible","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ansible@2.0.0.2-2ubuntu1.3+esm6?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.9.2+dfsg-2","1.9.4-1","2.0.0.2-2","2.0.0.2-2ubuntu1","2.0.0.2-2ubuntu1.1","2.0.0.2-2ubuntu1.2","2.0.0.2-2ubuntu1.3","2.0.0.2-2ubuntu1.3+esm1","2.0.0.2-2ubuntu1.3+esm2","2.0.0.2-2ubuntu1.3+esm3","2.0.0.2-2ubuntu1.3+esm4","2.0.0.2-2ubuntu1.3+esm5","2.0.0.2-2ubuntu1.3+esm6"],"ecosystem_specific":{"binaries":[{"binary_version":"2.0.0.2-2ubuntu1.3+esm6","binary_name":"ansible"},{"binary_version":"2.0.0.2-2ubuntu1.3+esm6","binary_name":"ansible-fireball"},{"binary_version":"2.0.0.2-2ubuntu1.3+esm6","binary_name":"ansible-node-fireball"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-14330.json"}},{"package":{"name":"ansible","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ansible@2.5.1+dfsg-1ubuntu0.1+esm5?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.3.1.0+dfsg-2","2.5.0+dfsg-1","2.5.1+dfsg-1","2.5.1+dfsg-1ubuntu0.1","2.5.1+dfsg-1ubuntu0.1+esm1","2.5.1+dfsg-1ubuntu0.1+esm2","2.5.1+dfsg-1ubuntu0.1+esm3","2.5.1+dfsg-1ubuntu0.1+esm4","2.5.1+dfsg-1ubuntu0.1+esm5"],"ecosystem_specific":{"binaries":[{"binary_version":"2.5.1+dfsg-1ubuntu0.1+esm5","binary_name":"ansible"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-14330.json"}},{"package":{"name":"ansible","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/ansible@2.9.6+dfsg-1ubuntu0.1~esm3?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.8.3+dfsg-1","2.8.6+dfsg-1","2.9.2+dfsg-1","2.9.4+dfsg-1","2.9.6+dfsg-1","2.9.6+dfsg-1ubuntu0.1~esm1","2.9.6+dfsg-1ubuntu0.1~esm2","2.9.6+dfsg-1ubuntu0.1~esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.9.6+dfsg-1ubuntu0.1~esm3","binary_name":"ansible"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-14330.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}