First published: Tue Jul 14 2020(Updated: )
A data exposure flaw was found in Ansible Tower in versions before 3.7.2, where sensitive data can be exposed from the /api/v2/labels/ endpoint. This flaw allows users from other organizations in the system to retrieve any label from the organization and also disclose organization names. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible_tower | <3.7.2 | 3.7.2 |
Redhat Ansible Tower | <3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14329 is a data exposure flaw in Ansible Tower where sensitive data can be exposed from the /api/v2/labels/ endpoint.
CVE-2020-14329 allows users from other organizations to retrieve any label from the organization and disclose organization names.
CVE-2020-14329 has a severity value of 3.3, which is categorized as medium.
To fix CVE-2020-14329, upgrade Ansible Tower to version 3.7.2 or later.
You can find more information about CVE-2020-14329 on the Red Hat Security Advisory RHSA-2020:3328, the Red Hat CVE page, and the Bugzilla page.