Vulnerability Name:

CVE-2021-3532 (CCN-203874)

Assigned:2021-06-04
Published:2021-06-04
Updated:2022-10-07
Summary:A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)
4.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-732
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2021-3532

Source: CCN
Type: Red Hat Bugzilla – Bug 1956464
(CVE-2021-3532) - CVE-2021-3532 ansible: async_file sensitive information disclosure

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1956464

Source: XF
Type: UNKNOWN
ansible-cve20213532-info-disc(203874)

Source: CCN
Type: Ansible Web site
Ansible is Simple IT Automation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:ansible_tower:3.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:ansible_automation_platform:1.2:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:ansible_tower:3.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:redhat:openstack-rdo:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:redhat:ansible_automation_platform:1.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    redhat ansible tower 3.7.0
    redhat ansible automation platform 1.2
    redhat enterprise linux 7.0
    redhat ansible engine 2.0
    redhat ansible tower 3.0
    fedoraproject fedora 34
    redhat openstack-rdo -
    redhat ansible automation platform 1.2