Red Hat Tower vulnerabilities

3 known vulnerabilities affecting red_hat/tower.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2019-19340HIGHCVSS 8.2vansible_tower versions 3.6.x before 3.6.2vansible_tower versions 3.5.x before 3.5.42019-12-19
CVE-2019-19340 [HIGH] CWE-1188 CVE-2019-19340: A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enablin A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.
cvelistv5nvd
CVE-2019-19342MEDIUMCVSS 5.3vall ansible_tower versions 3.6.x before 3.6.2vall ansible_tower versions 3.5.x before 3.5.42019-12-19
CVE-2019-19342 [MEDIUM] CWE-209 CVE-2019-19342: A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.4, when /websock A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.4, when /websocket is requested and the password contains the '#' character. This request would cause a socket error in RabbitMQ when parsing the password and an HTTP error code 500 and partial password disclose will occur in plaintext. An attacker could easily guess
cvelistv5nvd
CVE-2019-3869HIGHCVSS 7.2v3.3.5v3.4.32019-03-28
CVE-2019-3869 [HIGH] CWE-214 CVE-2019-3869: When running Tower before 3.4.3 on OpenShift or Kubernetes, application credentials are exposed to p When running Tower before 3.4.3 on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.
cvelistv5nvd