First published: Tue Jul 14 2020(Updated: )
A Server-side request forgery (SSRF) flaw was found in Ansible Tower in versions before 3.6.5 and before 3.7.2. Functionality on the Tower server is abused by supplying a URL that could lead to the server processing it. This flaw leads to the connection to internal services or the exposure of additional internal services by abusing the test feature of lookup credentials to forge HTTP/HTTPS requests from the server and retrieving the results of the response.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Tower | <3.6.5 | |
Redhat Ansible Tower | >=3.7.0<3.7.2 | |
redhat/ansible_tower | <3.6.5 | 3.6.5 |
redhat/ansible_tower | <3.7.2 | 3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw is CVE-2020-14327.
The severity level of CVE-2020-14327 is medium.
The affected software is Redhat Ansible Tower before version 3.6.5 and before version 3.7.2.
CVE-2020-14327 is a Server-side request forgery (SSRF) flaw in Ansible Tower that allows an attacker to abuse functionality on the Tower server to connect to internal services or expose additional information.
To fix CVE-2020-14327, update Ansible Tower to version 3.6.5 or version 3.7.2.