First published: Sat Mar 28 2020(Updated: )
A flaw was found in Ansible Tower when running Openshift. Tower runs a memcached, which is accessed via TCP. An attacker can take advantage of writing a playbook polluting this cache, causing a denial of service attack. This attack would not completely stop the service, but in the worst-case scenario, it can reduce the Tower performance, for which memcached is designed. Theoretically, more sophisticated attacks can be performed by manipulating and crafting the cache, as Tower relies on memcached as a place to pull out setting values. Confidential and sensitive data stored in memcached should not be pulled, as this information is encrypted. This flaw affects Ansible Tower versions before 3.6.4, Ansible Tower versions before 3.5.6 and Ansible Tower versions before 3.4.6.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible_tower | <3.6.4 | 3.6.4 |
redhat/ansible_tower | <3.5.6 | 3.5.6 |
redhat/ansible_tower | <3.4.6 | 3.4.6 |
Redhat Ansible Tower | <3.4.6 | |
Redhat Ansible Tower | >=3.5.0<3.5.6 | |
Redhat Ansible Tower | >=3.6.0<3.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10697 is a vulnerability found in Ansible Tower when running Openshift, allowing an attacker to cause a denial of service attack by polluting the memcached cache.
CVE-2020-10697 can cause a denial of service attack on Ansible Tower when running Openshift.
CVE-2020-10697 has a severity rating of medium with a score of 4.4.
To fix CVE-2020-10697, update Ansible Tower to version 3.6.4, 3.5.6, or 3.4.6, depending on your current version.
You can find more information about CVE-2020-10697 on the Red Hat Bugzilla page: https://bugzilla.redhat.com/show_bug.cgi?id=1818445