Lucene search

K
cveRedhatCVE-2020-10697
HistoryMay 27, 2021 - 7:15 p.m.

CVE-2020-10697

2021-05-2719:15:07
CWE-862
redhat
web.nvd.nist.gov
55
4
ansible tower
cve-2020-10697
dos attack
memcached
security vulnerability
ansible tower versions

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

AI Score

4.5

Confidence

High

EPSS

0

Percentile

12.6%

A flaw was found in Ansible Tower when running Openshift. Tower runs a memcached, which is accessed via TCP. An attacker can take advantage of writing a playbook polluting this cache, causing a denial of service attack. This attack would not completely stop the service, but in the worst-case scenario, it can reduce the Tower performance, for which memcached is designed. Theoretically, more sophisticated attacks can be performed by manipulating and crafting the cache, as Tower relies on memcached as a place to pull out setting values. Confidential and sensitive data stored in memcached should not be pulled, as this information is encrypted. This flaw affects Ansible Tower versions before 3.6.4, Ansible Tower versions before 3.5.6 and Ansible Tower versions before 3.4.6.

Affected configurations

Nvd
Vulners
Node
redhatansible_towerRange<3.4.6
OR
redhatansible_towerRange3.5.03.5.6
OR
redhatansible_towerRange3.6.03.6.4
VendorProductVersionCPE
redhatansible_tower*cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Tower",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "ansible_tower 3.6.4, ansible_tower 3.5.6, ansible_tower 3.4.6"
      }
    ]
  }
]

Social References

More

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

AI Score

4.5

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVE-2020-10697