First published: Tue Jul 14 2020(Updated: )
A flaw was found in Ansible Tower in versions before 3.7.2. A Server Side Request Forgery flaw can be abused by supplying a URL which could lead to the server processing it connecting to internal services or exposing additional internal services and more particularly retrieving full details in case of error. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible_tower | <3.7.2 | 3.7.2 |
Redhat Ansible Tower | <3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2020-14328.
The severity of CVE-2020-14328 is low, with a severity value of 3.3.
You can exploit CVE-2020-14328 by supplying a URL that could lead to the server processing it connecting to internal services or exposing additional internal services.
Yes, a fix is available for CVE-2020-14328 in Ansible Tower version 3.7.2.
You can find more information about CVE-2020-14328 in the references provided: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1856786), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2020:3328), [Red Hat CVE page](https://access.redhat.com/security/cve/cve-2020-14328).