Bug 1688508 (CVE-2019-3869)

Summary: CVE-2019-3869 Tower: credentials leaked through environment variables
Product: [Other] Security Response Reporter: Borja Tarraso <btarraso>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dajohnso, dmetzger, gblomqui, gmainwar, gmccullo, gtanzill, jfrey, jhardy, jlaska, jprause, kdixon, obarenbo, roliveri, security-response-team, simaishi
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ansible-tower 3.3.5, ansible-tower 3.4.3 Doc Type: If docs needed, set a value
Doc Text:
When running Tower on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-03-27 15:53:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1688509, 1723666    
Bug Blocks: 1688165    

Description Borja Tarraso 2019-03-13 21:19:35 UTC
When running Tower on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.

Comment 3 Borja Tarraso 2019-03-13 22:17:35 UTC
Acknowledgments:

Name: Chris Bertsch (FactSet Research Systems Inc)

Comment 4 Borja Tarraso 2019-03-26 19:30:36 UTC
External References:

https://github.com/ansible/awx/pull/3505