Vulnerabilites related to pulpproject - pulp_ansible
cve-2022-3644
Vulnerability from cvelistv5
Published
2022-10-25 00:00
Modified
2024-08-03 01:14
Severity ?
EPSS score ?
Summary
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | pulp_ansible |
Version: 0.15 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:14:03.138Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pulp_ansible", vendor: "n/a", versions: [ { status: "affected", version: "0.15", }, ], }, ], descriptions: [ { lang: "en", value: "The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-256", description: "CWE-256", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-25T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2022-3644", datePublished: "2022-10-25T00:00:00", dateReserved: "2022-10-21T00:00:00", dateUpdated: "2024-08-03T01:14:03.138Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2022-10-25 18:15
Modified
2024-11-21 07:19
Severity ?
Summary
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pulpproject | pulp_ansible | - | |
redhat | ansible_automation_platform | 2.0 | |
redhat | satellite | 6.0 | |
redhat | update_infrastructure | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pulpproject:pulp_ansible:-:*:*:*:*:*:*:*", matchCriteriaId: "4DCED721-A508-4E93-ACF5-AB2B6C4BF2C6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*", matchCriteriaId: "7B4BE2D6-43C3-4065-A213-5DB1325DC78F", vulnerable: true, }, { criteria: "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*", matchCriteriaId: "848C92A9-0677-442B-8D52-A448F2019903", vulnerable: true, }, { criteria: "cpe:2.3:a:redhat:update_infrastructure:3.0:*:*:*:*:*:*:*", matchCriteriaId: "812C62CE-7B5A-491C-A02E-0E848D1FD780", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.", }, { lang: "es", value: "La colección remota para pulp_ansible almacena tokens en texto plano en lugar de usar el campo encriptado de pulp y los expone en modo de lectura/escritura por medio de la API () en lugar de marcarla como sólo de escritura", }, ], id: "CVE-2022-3644", lastModified: "2024-11-21T07:19:56.747", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-10-25T18:15:10.020", references: [ { source: "secalert@redhat.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-256", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }