Password Parsing Flaw in Ansible Tower by Red Hat
CVE-2019-19342
5.3MEDIUM
Summary
A vulnerability exists in Ansible Tower that occurs when a websocket request is made with a password containing the '#' character. This flaw leads to a socket error in RabbitMQ during password parsing, resulting in an HTTP error code 500 and a potential leak of the password in plaintext. As attackers may exploit this weakness, predictable passwords could be easily guessed or subjected to brute-force techniques, increasing the risk of unauthorized access.
Affected Version(s)
Tower all ansible_tower versions 3.6.x before 3.6.2
Tower all ansible_tower versions 3.5.x before 3.5.4
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved