Bug 1782624 (CVE-2019-19340) - CVE-2019-19340 Tower: enabling RabbitMQ manager in the installer exposes the management interface publicly
Summary: CVE-2019-19340 Tower: enabling RabbitMQ manager in the installer exposes the ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-19340
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1782629 1782630
Blocks: 1782617
TreeView+ depends on / blocked
 
Reported: 2019-12-12 01:01 UTC by Borja Tarraso
Modified: 2021-02-16 20:52 UTC (History)
14 users (show)

Fixed In Version: ansible_tower 3.6.2, ansible_tower 3.5.4
Clone Of:
Environment:
Last Closed: 2019-12-16 20:09:26 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:4242 0 None None None 2019-12-16 18:34:22 UTC
Red Hat Product Errata RHSA-2019:4243 0 None None None 2019-12-16 18:36:36 UTC

Description Borja Tarraso 2019-12-12 01:01:15 UTC
Using '-e rabbitmq_enable_manager=true' in the installer exposes the RabbitMQ management interface publicly with a guessable admin user.

Comment 1 Borja Tarraso 2019-12-12 01:01:17 UTC
Acknowledgments:

Name: Ryan Petrello (Red Hat)

Comment 6 errata-xmlrpc 2019-12-16 18:34:20 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Tower 3.5 for RHEL 7

Via RHSA-2019:4242 https://access.redhat.com/errata/RHSA-2019:4242

Comment 7 errata-xmlrpc 2019-12-16 18:36:34 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Tower 3.6 for RHEL 7

Via RHSA-2019:4243 https://access.redhat.com/errata/RHSA-2019:4243

Comment 8 Product Security DevOps Team 2019-12-16 20:09:26 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-19340

Comment 10 Eric Christensen 2019-12-16 21:10:53 UTC
Mitigation:

The issue could be mitigated by limiting the access of the interface to internal trusted networks, limiting the ports open and set the firewall with more restrictive rules. Some of these instructions are already suggested in the Ansible Tower documentation as part of the Ansible Tower Administration Guide. Issue could be also mitigated by deleting the guest default user by running the command "rabbitmqctl delete_user guest".


Note You need to log in before you can comment on or make changes to this bug.