Bug 1856786 (CVE-2020-14328)
Summary: | CVE-2020-14328 Tower: SSRF: Server Side Request Forgery on webhooks | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Borja Tarraso <btarraso> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | cmeyers, gblomqui, gmainwar, mabashia, notting, rpetrell, smcdonal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ansible_tower 3.7.2 | Doc Type: | --- |
Doc Text: |
A flaw was found in Ansible Tower. A Server Side Request Forgery flaw can be abused by supplying a URL which could lead to the server processing it connecting to internal services or exposing additional internal services and more particularly retrieving full details in case of error. The highest threat from this vulnerability is to data confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-08-05 19:27:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1856790 | ||
Bug Blocks: | 1856718 |
Description
Borja Tarraso
2020-07-14 13:18:55 UTC
Statement: Ansible Tower 3.7.1 as well as previous versions are affected. Acknowledgments: Name: Maxime ESCOURBIAC (Michelin CERT team) This issue has been addressed in the following products: Red Hat Ansible Tower 3.7 for RHEL 7 Via RHSA-2020:3328 https://access.redhat.com/errata/RHSA-2020:3328 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-14328 |