Security restrictions bypass in Ansible Tower



Published: 2018-12-20 | Updated: 2018-12-26
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-16879
CWE-ID CWE-264
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Ansible Tower
Web applications / Remote management & hosting panels

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU16715

Risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-16879

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to bypass security restrictions.

The vulnerability exists due to security channel is not set properly for AMPQ connection. An adjacent attacker can bypass security restrictions and gain access to potentially sensitive information or cause the service to crash.

Mitigation

Update to version 3.3.3.

Vulnerable software versions

Ansible Tower: 3.2.0 - 3.3.2

External links

http://docs.ansible.com/ansible-tower/latest/html/installandreference/release_notes.html
http://github.com/ansible/tower-packaging/pull/207


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###