First published: Mon Mar 30 2020(Updated: )
A flaw was found in Ansible Tower when running jobs. This flaw allows an attacker to access the stdout of the executed jobs which are run from other organizations. Some sensible data can be disclosed. However, critical data should not be disclosed, as it should be protected by the no_log flag when debugging is enabled. This flaw affects Ansible Tower versions before 3.6.4, Ansible Tower versions before 3.5.6 and Ansible Tower versions before 3.4.6.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Tower | <3.4.6 | |
Redhat Ansible Tower | >=3.5.0<3.5.6 | |
Redhat Ansible Tower | >=3.6.0<3.6.4 | |
redhat/ansible_tower | <3.6.4 | 3.6.4 |
redhat/ansible_tower | <3.5.6 | 3.5.6 |
redhat/ansible_tower | <3.4.6 | 3.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10698 is a vulnerability found in Ansible Tower that allows an attacker to access the stdout of executed jobs.
The severity level of CVE-2020-10698 is low with a severity value of 3.3.
Ansible Tower versions up to and including 3.6.4 are affected by CVE-2020-10698.
An attacker can exploit CVE-2020-10698 by accessing the stdout of executed jobs in Ansible Tower.
Yes, the fix for CVE-2020-10698 is available in Ansible Tower version 3.6.4.