CVE-2019-19340

A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:34

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340 - Issue Tracking, Vendor Advisory

Information

Published : 2019-12-19 21:15

Updated : 2024-11-21 04:34


NVD link : CVE-2019-19340

Mitre link : CVE-2019-19340

CVE.ORG link : CVE-2019-19340


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • ansible_tower
CWE
CWE-1188

Insecure Default Initialization of Resource