<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2023-4237</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2023-4237</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>3</Number>
        <Date>2023-10-04T23:22:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-08-09T23:16:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-10-04T23:22:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2023-4237</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE 15">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE 15">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE 15" CPE="cpe:/o:suse:sle-manager-tools:15">SUSE Manager Client Tools for SLE 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy Module 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Proxy Module 4.2">
        <FullProductName ProductID="SUSE Manager Proxy Module 4.2" CPE="cpe:/o:suse:sle-module-suse-manager-proxy:4.2">SUSE Manager Proxy Module 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy Module 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy Module 4.3">
        <FullProductName ProductID="SUSE Manager Proxy Module 4.3" CPE="cpe:/o:suse:sle-module-suse-manager-proxy:4.3">SUSE Manager Proxy Module 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ansible">
      <FullProductName ProductID="ansible" CPE="cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*">ansible</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-doc">
      <FullProductName ProductID="ansible-doc">ansible-doc</FullProductName>
    </Branch>
    <Relationship ProductReference="ansible" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE 15">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE 15:ansible">ansible as a component of SUSE Manager Client Tools for SLE 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.2">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.2:ansible">ansible as a component of SUSE Manager Proxy Module 4.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-doc" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.2">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.2:ansible-doc">ansible-doc as a component of SUSE Manager Proxy Module 4.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:ansible">ansible as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-doc" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:ansible-doc">ansible-doc as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.</Note>
    </Notes>
    <CVE>CVE-2023-4237</CVE>
    <ProductStatuses>
      <Status Type="Known Affected">
        <ProductID>SUSE Manager Client Tools for SLE 15:ansible</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.2:ansible</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.2:ansible-doc</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:ansible-doc</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
