Multiple vulnerabilities in Ansible Automation Platform 2.4 packages



Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2024-7143
CVE-2024-37891
CVE-2024-24790
CVE-2024-24788
CWE-ID CWE-277
CWE-200
CWE-20
CWE-835
Exploitation vector Network
Public exploit N/A
Vulnerable software
python3x-urllib3 (Red Hat package)
Operating systems & Components / Operating system package or component

python3x-pulpcore (Red Hat package)
Operating systems & Components / Operating system package or component

python3x-django (Red Hat package)
Operating systems & Components / Operating system package or component

receptor (Red Hat package)
Operating systems & Components / Operating system package or component

python-urllib3 (Red Hat package)
Operating systems & Components / Operating system package or component

python-pulpcore (Red Hat package)
Operating systems & Components / Operating system package or component

python-django (Red Hat package)
Operating systems & Components / Operating system package or component

automation-controller (Red Hat package)
Operating systems & Components / Operating system package or component

Ansible Automation Platform
Server applications / Other server solutions

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Insecure inherited permissions

EUVDB-ID: #VU97631

Risk: Medium

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-7143

CWE-ID: CWE-277 - Insecure inherited permissions

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges within the application.

The vulnerability exists due to the way permissions are assigned on new tasks with RBAC enabled. A remote user can use a specially crafted task that creates new objects. Such objects will be owned by the oldest user with model/domain-level task permissions within the application and executed with privileges of such a user.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap

python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap

python3x-django (Red Hat package): before 4.2.16-1.el8ap

receptor (Red Hat package): before 1.4.8-1.1.el8ap

python-urllib3 (Red Hat package): before 1.26.20-1.el9ap

python-pulpcore (Red Hat package): before 3.28.32-1.el9ap

python-django (Red Hat package): before 4.2.16-1.el9ap

automation-controller (Red Hat package): before 4.5.11-1.el8ap

Ansible Automation Platform: before 2.4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:6765


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU92262

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-37891

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to Prox-Authorization header is not stripped during cross-origin redirects when using urllib3's proxy support with ProxyManager. A remote attacker can gain obtain proxy credentials used by the library.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap

python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap

python3x-django (Red Hat package): before 4.2.16-1.el8ap

receptor (Red Hat package): before 1.4.8-1.1.el8ap

python-urllib3 (Red Hat package): before 1.26.20-1.el9ap

python-pulpcore (Red Hat package): before 3.28.32-1.el9ap

python-django (Red Hat package): before 4.2.16-1.el9ap

automation-controller (Red Hat package): before 4.5.11-1.el8ap

Ansible Automation Platform: before 2.4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:6765


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU91160

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-24790

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to modify application behavior.

The vulnerability exists due to improper handling of IPv4-mapped IPv6 addresses in net/netip within multiple methods, e.g. IsPrivate, IsLoopback. The affected methods return false for addresses which would return true in their traditional IPv4 forms, leading to potential bypass of implemented security features.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap

python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap

python3x-django (Red Hat package): before 4.2.16-1.el8ap

receptor (Red Hat package): before 1.4.8-1.1.el8ap

python-urllib3 (Red Hat package): before 1.26.20-1.el9ap

python-pulpcore (Red Hat package): before 3.28.32-1.el9ap

python-django (Red Hat package): before 4.2.16-1.el9ap

automation-controller (Red Hat package): before 4.5.11-1.el8ap

Ansible Automation Platform: before 2.4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:6765


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Infinite loop

EUVDB-ID: #VU89296

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-24788

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when processing DNS responses. A remote attacker can send a specially crafted DNS response to the application and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap

python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap

python3x-django (Red Hat package): before 4.2.16-1.el8ap

receptor (Red Hat package): before 1.4.8-1.1.el8ap

python-urllib3 (Red Hat package): before 1.26.20-1.el9ap

python-pulpcore (Red Hat package): before 3.28.32-1.el9ap

python-django (Red Hat package): before 4.2.16-1.el9ap

automation-controller (Red Hat package): before 4.5.11-1.el8ap

Ansible Automation Platform: before 2.4

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2024:6765


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###