Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-19342


A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.4, when /websocket is requested and the password contains the '#' character. This request would cause a socket error in RabbitMQ when parsing the password and an HTTP error code 500 and partial password disclose will occur in plaintext. An attacker could easily guess some predictable passwords or brute force the password.


Published

2019-12-19T21:15:14.167

Last Modified

2024-11-21T04:34:36.853

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-209
  • Type: Primary
    CWE-209

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat ansible_tower < 3.5.4 Yes
Application redhat ansible_tower < 3.6.2 Yes

References