#VU24220 Improper access control in Ansible Tower


Published: 2020-01-13

Vulnerability identifier: #VU24220

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-19340

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Ansible Tower
Web applications / Remote management & hosting panels

Vendor: Red Hat Inc.

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in Ansible Tower, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Ansible Tower: 3.5.0 - 3.6.1


External links
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability