Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2023-44487

Disclosure Date: October 10, 2023 (last updated June 28, 2024)
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Attacker Value
Unknown

CVE-2023-50782

Disclosure Date: February 05, 2024 (last updated September 06, 2024)
A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Attacker Value
Unknown

CVE-2023-5189

Disclosure Date: November 14, 2023 (last updated April 25, 2024)
A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.
Attacker Value
Unknown

CVE-2023-4237

Disclosure Date: October 04, 2023 (last updated August 26, 2024)
A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.
Attacker Value
Unknown

CVE-2022-3644

Disclosure Date: October 25, 2022 (last updated December 22, 2024)
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
Attacker Value
Unknown

CVE-2022-3205

Disclosure Date: September 13, 2022 (last updated May 28, 2024)
Cross site scripting in automation controller UI in Red Hat Ansible Automation Platform 1.2 and 2.0 where the project name is susceptible to XSS injection
Attacker Value
Unknown

CVE-2022-1632

Disclosure Date: September 01, 2022 (last updated October 08, 2023)
An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.
Attacker Value
Unknown

CVE-2021-4112

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.
Attacker Value
Unknown

CVE-2022-2568

Disclosure Date: August 18, 2022 (last updated October 08, 2023)
A privilege escalation flaw was found in the Ansible Automation Platform. This flaw allows a remote authenticated user with 'change user' permissions to modify the account settings of the superuser account and also remove the superuser privileges.
Attacker Value
Unknown

CVE-2021-3620

Disclosure Date: March 03, 2022 (last updated October 07, 2023)
A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.