Red Hat Ansible Tower vulnerabilities
4 known vulnerabilities affecting red_hat/ansible_tower.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2020-10782MEDIUMCVSS 6.5vAffected: version 3.7.0vFixed: version 3.7.12020-06-18
CVE-2020-10782 [MEDIUM] CWE-200 CVE-2020-10782: An exposure of sensitive information flaw was found in Ansible version 3.7.0. Sensitive information,
An exposure of sensitive information flaw was found in Ansible version 3.7.0. Sensitive information, such tokens and other secrets could be readable and exposed from the rsyslog configuration file, which has set the wrong world-readable permissions. The highest threat from this vulnerability is to confidentiality. This is fixed in Ansible version 3.
cvelistv5nvd
CVE-2016-7070HIGHCVSS 8.0v3.0.32018-09-11
CVE-2016-7070 [HIGH] CWE-266 CVE-2016-7070: A privilege escalation flaw was found in the Ansible Tower. When Tower before 3.0.3 deploys a Postgr
A privilege escalation flaw was found in the Ansible Tower. When Tower before 3.0.3 deploys a PostgreSQL database, it incorrectly configures the trust level of postgres user. An attacker could use this vulnerability to gain admin level access to the database.
cvelistv5nvd
CVE-2017-7528MEDIUMCVSS 6.5vAs shipped with Red Hat CloudForms Management Engine 52018-08-22
CVE-2017-7528 [MEDIUM] CWE-113 CVE-2017-7528: Ansible Tower as shipped with Red Hat CloudForms Management Engine 5 is vulnerable to CRLF Injection
Ansible Tower as shipped with Red Hat CloudForms Management Engine 5 is vulnerable to CRLF Injection. It was found that X-Forwarded-For header allows internal servers to deploy other systems (using callback).
cvelistv5nvd
CVE-2017-12148HIGHCVSS 7.2v3.1.5v3.2.02018-07-27
CVE-2017-12148 [HIGH] CWE-20 CVE-2017-12148: A flaw was found in Ansible Tower's interface before 3.1.5 and 3.2.0 with SCM repositories. If a Tow
A flaw was found in Ansible Tower's interface before 3.1.5 and 3.2.0 with SCM repositories. If a Tower project (SCM repository) definition does not have the 'delete before update' flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM
cvelistv5nvd