Bug 1565862 (CVE-2018-1104)
Summary: | CVE-2018-1104 ansible-tower: Remote code execution by users with access to define variables in job templates | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | cpelland, dajohnso, gblomqui, gmccullo, gtanzill, hhudgeon, jfrey, jhardy, jprause, mglantz, obarenbo, roliveri, rpetrell, security-response-team, simaishi, simon, sudo |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ansible-tower 3.1.6, ansible-tower 3.2.4 | Doc Type: | If docs needed, set a value |
Doc Text: |
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:19:52 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1572740, 1572747, 1572748 | ||
Bug Blocks: | 1565867 |
Description
Sam Fowler
2018-04-11 00:16:19 UTC
Acknowledgments: Name: Simon Vikström The only way around this, as far as I can see, is to restrict ability to define extra variables for job templates (includes ability to define variables at the all levels, including from the inventory, a.s.o.). This, naturally, is crippling to the functionality of Tower. Anyone involved in playbook/role/inventory development/administration would have the ability to execute this exploit. Also, it would be possible for someone to craft a role, put it in Ansible Galaxy to attack any users using it. This is now public: https://www.ansible.com/security This issue has been addressed in Ansible Tower release 3.1.6 and 3.2.4, for more information please see https://www.ansible.com/security This issue has been addressed in the following products: CloudForms Management Engine 5.9 Via RHSA-2018:1328 https://access.redhat.com/errata/RHSA-2018:1328 This issue has been addressed in the following products: CloudForms Management Engine 5.8 Via RHSA-2018:1972 https://access.redhat.com/errata/RHSA-2018:1972 |