Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used. Reference: https://github.com/erlang/otp/releases/tag/OTP-23.1
Marking Red Hat OpenStack Platform notaffected as all versions we ship (18.3.4.11, 20.3.8.24, 21.3.8.13) is below the version which this vulnerability is introduced (22.3.1 & 23.0).
External References: https://erlang.org/download/OTP-23.1.README
Ansible Tower 3.6 and earlier use Erlang 20.3.8.x and are therefore not affected by this bug. (Ansible Tower 3.7 and later do not use Erlang at all.)
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25623