Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-19340

Опубликовано: 19 дек. 2019
Источник: nvd
CVSS3: 8.2
CVSS3: 8.2
CVSS2: 6.4
EPSS Низкий

Описание

A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*
Версия от 3.5.0 (включая) до 3.5.3 (исключая)
cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*
Версия от 3.6.0 (включая) до 3.6.2 (исключая)
Конфигурация 2
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

EPSS

Процентиль: 61%
0.0041
Низкий

8.2 High

CVSS3

8.2 High

CVSS3

6.4 Medium

CVSS2

Дефекты

CWE-1188
CWE-1188

Связанные уязвимости

CVSS3: 8.2
redhat
около 6 лет назад

A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.

CVSS3: 8.2
github
больше 3 лет назад

A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.

EPSS

Процентиль: 61%
0.0041
Низкий

8.2 High

CVSS3

8.2 High

CVSS3

6.4 Medium

CVSS2

Дефекты

CWE-1188
CWE-1188