RHBA-2019:0884
Vulnerability from csaf_redhat - Published: 2019-04-25 09:10 - Updated: 2026-02-23 16:21Summary
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.3.5-3 - Container
Severity
Moderate
Notes
Topic: Red Hat Ansible Tower 3.3.5-3 - Container
Details: - Fixed an issue to no longer expose Tower service credentials to playbook
runs via environment variables when running in OpenShift (CVE-2019-3869)
- Fixed the Notifications tab to properly appear when viewing a Job
Template
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
When running Tower on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.
7.2 (High)
Vendor Fix
For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html
https://access.redhat.com/errata/RHBA-2019:0884
References
Acknowledgments
FactSet Research Systems Inc
Chris Bertsch
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Ansible Tower 3.3.5-3 - Container",
"title": "Topic"
},
{
"category": "general",
"text": "- Fixed an issue to no longer expose Tower service credentials to playbook \n runs via environment variables when running in OpenShift (CVE-2019-3869)\n- Fixed the Notifications tab to properly appear when viewing a Job \n Template",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2019:0884",
"url": "https://access.redhat.com/errata/RHBA-2019:0884"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_0884.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.3.5-3 - Container",
"tracking": {
"current_release_date": "2026-02-23T16:21:51+00:00",
"generator": {
"date": "2026-02-23T16:21:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHBA-2019:0884",
"initial_release_date": "2019-04-25T09:10:43+00:00",
"revision_history": [
{
"date": "2019-04-25T09:10:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-04-25T09:10:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-23T16:21:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Tower 3.3 for RHEL 7 Server",
"product": {
"name": "Red Hat Ansible Tower 3.3 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_tower:3.3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Tower"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64",
"product": {
"name": "ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64",
"product_id": "ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2?arch=amd64\u0026repository_url=registry.redhat.io/ansible-tower-33/ansible-tower\u0026tag=3.3.5-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64 as a component of Red Hat Ansible Tower 3.3 for RHEL 7 Server",
"product_id": "7Server-Ansible-Tower-3.3:ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64"
},
"product_reference": "ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64",
"relates_to_product_reference": "7Server-Ansible-Tower-3.3"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Chris Bertsch"
],
"organization": "FactSet Research Systems Inc"
}
],
"cve": "CVE-2019-3869",
"cwe": {
"id": "CWE-214",
"name": "Invocation of Process Using Visible Sensitive Information"
},
"discovery_date": "2019-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1688508"
}
],
"notes": [
{
"category": "description",
"text": "When running Tower on OpenShift or Kubernetes, application credentials are exposed to playbook job runs via environment variables. A malicious user with the ability to write playbooks could use this to gain administrative privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tower: credentials leaked through environment variables",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Ansible-Tower-3.3:ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3869"
},
{
"category": "external",
"summary": "RHBZ#1688508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3869"
},
{
"category": "external",
"summary": "https://github.com/ansible/awx/pull/3505",
"url": "https://github.com/ansible/awx/pull/3505"
}
],
"release_date": "2019-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-04-25T09:10:43+00:00",
"details": "For information on upgrading Ansible Tower, reference the Ansible Tower Upgrade and Migration Guide: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/index.html",
"product_ids": [
"7Server-Ansible-Tower-3.3:ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2019:0884"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Ansible-Tower-3.3:ansible-tower-33/ansible-tower@sha256:86c6c9da208b8794444d672af98509773790b620135b0dd9938f4fbeacd7bcf2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Tower: credentials leaked through environment variables"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…