The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
Storing a password in plaintext may result in a system compromise.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234 | third party advisory exploit |