Описание
A vulnerability was found in Ansible Tower before 3.6.1 where an attacker with low privilege could retrieve usernames and passwords credentials from the new RHSM saved in plain text into the database at '/api/v2/config' when applying the Ansible Tower license.
A flaw was found in Ansible Tower where the RHSM credentials are saved in plain text in the database that is available at '/api/v2/config' after applying the Ansible Tower license. Attackers with this information could log into RHSM and modify licenses and make other changes.
Отчет
Ansible Tower 3.6.0 is affected, but Ansible Tower 3.5, 3.4, and 3.3 are not vulnerable as they do not include the new RHSM. CloudForms 5.9 and 5.10 are not vulnerable as they do not use Ansible Tower 3.6.0.
Меры по смягчению последствий
There is no mitigation for this issue since this issue happens when Red Hat license is applied.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| CloudForms Management Engine 5 | ansible-tower | Not affected | ||
| Red Hat Ansible Tower 3.6 for RHEL 7 | ansible-tower-36/ansible-tower | Fixed | RHSA-2019:3958 | 25.11.2019 |
Показывать по
Дополнительная информация
Статус:
8.4 High
CVSS3
Связанные уязвимости
A vulnerability was found in Ansible Tower before 3.6.1 where an attacker with low privilege could retrieve usernames and passwords credentials from the new RHSM saved in plain text into the database at '/api/v2/config' when applying the Ansible Tower license.
An attacker with low privilege could retrieve usernames and passwords credentials from the new RHSM saved in plain text into the database at '/api/v2/config' when applying the Ansible Tower license.
Уязвимость компонента «/api/v2/config» консоли управления Red Hat Ansible Tower, позволяющая нарушителю получить несанкционированный доступ к паролям пользователей приложения
8.4 High
CVSS3