Password Parsing Flaw in Ansible Tower by Red Hat
CVE-2019-19342

5.3MEDIUM

Key Information:

Vendor
Red Hat
Status
Vendor
CVE Published:
19 December 2019

Summary

A vulnerability exists in Ansible Tower that occurs when a websocket request is made with a password containing the '#' character. This flaw leads to a socket error in RabbitMQ during password parsing, resulting in an HTTP error code 500 and a potential leak of the password in plaintext. As attackers may exploit this weakness, predictable passwords could be easily guessed or subjected to brute-force techniques, increasing the risk of unauthorized access.

Affected Version(s)

Tower all ansible_tower versions 3.6.x before 3.6.2

Tower all ansible_tower versions 3.5.x before 3.5.4

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.