First published: Thu Dec 19 2019(Updated: )
A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Tower | >=3.5.0<3.5.3 | |
Redhat Ansible Tower | >=3.6.0<3.6.2 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19340 is a vulnerability found in Ansible Tower versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3.
CVE-2019-19340 affects Ansible Tower by exposing the RabbitMQ management interface publicly when enabling RabbitMQ manager.
The severity rating of CVE-2019-19340 is high with a CVSS score of 8.2.
To fix CVE-2019-19340 in Ansible Tower, upgrade to version 3.6.2 or 3.5.3.
More information about CVE-2019-19340 can be found at the following reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340