CVE-2019-19342Information Exposure via Error Message in Redhat Ansible Tower

Severity
5.3MEDIUMNVD
EPSS
0.2%
top 58.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 19
Latest updateMay 24

Description

A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.4, when /websocket is requested and the password contains the '#' character. This request would cause a socket error in RabbitMQ when parsing the password and an HTTP error code 500 and partial password disclose will occur in plaintext. An attacker could easily guess some predictable passwords or brute force the password.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDredhat/ansible_tower3.5.03.5.4+1
CVEListV5red_hat/towerall ansible_tower versions 3.5.x before 3.5.4, all ansible_tower versions 3.6.x before 3.6.2+1

🔴Vulnerability Details

2
GHSA
GHSA-85r5-c7pw-c69h: A flaw was found in Ansible Tower, versions 32022-05-24
CVEList
CVE-2019-19342: A flaw was found in Ansible Tower, versions 32019-12-19

📋Vendor Advisories

1
Red Hat
Tower: special characters in RabbitMQ passwords causes web socket 500 error2019-12-14

💬Community

1
Bugzilla
CVE-2019-19342 Tower: special characters in RabbitMQ passwords causes web socket 500 error2019-12-12
CVE-2019-19342 — Information Exposure via Error Message | cvebase