First published: Thu Dec 19 2019(Updated: )
A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.4, when /websocket is requested and the password contains the '#' character. This request would cause a socket error in RabbitMQ when parsing the password and an HTTP error code 500 and partial password disclose will occur in plaintext. An attacker could easily guess some predictable passwords or brute force the password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Tower | >=3.5.0<3.5.4 | |
Redhat Ansible Tower | >=3.6.0<3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19342 is a vulnerability found in Ansible Tower versions 3.6.x before 3.6.2 and 3.5.x before 3.5.4.
CVE-2019-19342 can cause a socket error in RabbitMQ and an HTTP error code 500, leading to partial password disclosure.
CVE-2019-19342 has a severity rating of 5.3 (medium).
To fix CVE-2019-19342, upgrade your Ansible Tower version to 3.5.4 or higher for 3.5.x versions, or to 3.6.2 or higher for 3.6.x versions.
You can find more information about CVE-2019-19342 at the following link: [https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19342](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19342)