First published: Tue Oct 04 2022(Updated: )
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field (<a href="https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234">https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234</a>) and exposes them in read/write mode via the API (<a href="https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/serializers.py#L170">https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/serializers.py#L170</a>) instead of marking it as write only.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pulpproject Pulp Ansible | ||
Redhat Ansible Automation Platform | =2.0 | |
Redhat Satellite | =6.0 | |
Redhat Update Infrastructure | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3644 is a vulnerability in the collection remote for pulp_ansible that stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API.
CVE-2022-3644 has a severity rating of medium, with a severity value of 5.5.
Pulpproject Pulp Ansible, Redhat Ansible Automation Platform 2.0, Redhat Satellite 6.0, and Redhat Update Infrastructure 3.0 are affected by CVE-2022-3644.
To fix CVE-2022-3644, it is recommended to update the affected software to a version that addresses the vulnerability.
You can find more information about CVE-2022-3644 and its details at the following reference: [link](https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234)