CVE Vulnerabilities

CVE-2019-3869

Invocation of Process Using Visible Sensitive Information

Published: Mar 28, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.2 MODERATE
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

When running Tower before 3.4.3 on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.

Weakness

A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.

Affected Software

NameVendorStart VersionEnd Version
Ansible_towerRedhat*3.3.5 (excluding)
Ansible_towerRedhat3.4.0 (including)3.4.3 (excluding)
CloudForms Management Engine 5.10RedHatansible-tower-0:3.4.3-1.el7at*
CloudForms Management Engine 5.10RedHatcfme-0:5.10.3.3-1.el7cf*
CloudForms Management Engine 5.10RedHatcfme-amazon-smartstate-0:5.10.3.3-1.el7cf*
CloudForms Management Engine 5.10RedHatcfme-appliance-0:5.10.3.3-1.el7cf*
CloudForms Management Engine 5.10RedHatcfme-gemset-0:5.10.3.3-1.el7cf*
Red Hat Ansible Tower 3.3 for RHEL 7RedHatansible-tower-33/ansible-tower:3.3.5-3*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-34/ansible-tower:3.4.3-4*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-34/ansible-tower-memcached:1.4.15-18*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-34/ansible-tower-messaging:3.7.4-10*

References