First published: Wed Jun 09 2021(Updated: )
A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Automation Platform | =1.2 | |
Redhat Ansible Tower | =3.7.0 | |
Redhat Ansible Engine | =2.0 | |
Redhat Ansible Tower | =3.0 | |
Redhat Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =34 | |
Redhat Openstack-rdo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3532.
The severity rating of CVE-2021-3532 is medium (5.5 out of 10).
Redhat Ansible Automation Platform 1.2, Redhat Ansible Tower 3.7.0, Redhat Ansible Engine 2.0, Redhat Ansible Tower 3.0, Redhat Enterprise Linux 7.0, Fedoraproject Fedora 34, and Redhat Openstack-rdo are affected by CVE-2021-3532.
The Common Weakness Enumeration (CWE) ID for CVE-2021-3532 is CWE-732 and CWE-200.
Yes, a fix is available for CVE-2021-3532. It is recommended to update to the latest version of the affected software.