First published: Wed Dec 01 2021(Updated: )
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ansible Automation Platform | =2.0 | |
Red Hat Ansible Automation Platform | ||
redhat ansible tower | =3.0 | |
redhat ANSIBLE automation platform | =2.0 | |
redhat ANSIBLE automation platform | =2.1 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-4112.
The severity of CVE-2021-4112 is high.
CVE-2021-4112 impacts Ansible Tower by allowing an attacker to elevate privileges from a low privileged user to an AWX user outside the isolated environment.
The affected software versions include Redhat Ansible Automation Platform Early Access 2.0, Redhat Ansible Automation Platform Text-only Advisories, Redhat Ansible Tower 3.0, Redhat Ansible Automation Platform 2.0, and Redhat Ansible Automation Platform 2.1.
To mitigate CVE-2021-4112, update to the patched versions mentioned in the Red Hat Security Advisories RHSA-2022:0460 and RHSA-2022:0474.