Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://security-tracker.debian.org/tracker/CVE-2014-4660", "name": "https://security-tracker.debian.org/tracker/CVE-2014-4660", "tags": ["Patch", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08", "name": "https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08", "tags": ["Patch"], "refsource": "MISC"}, {"url": "https://www.securityfocus.com/bid/68231", "name": "https://www.securityfocus.com/bid/68231", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://www.openwall.com/lists/oss-security/2014/06/26/19", "name": "https://www.openwall.com/lists/oss-security/2014/06/26/19", "tags": ["Mailing List", "Patch", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md", "name": "https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md", "tags": ["Release Notes"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the \"deb http://user:pass@server:port/\" format."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-522"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2014-4660", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "acInsufInfo": false, "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.5, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 1.8}}, "publishedDate": "2020-02-20T03:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.5.5"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-02-25T20:13Z"}