CVE-2020-10709 Detail

Awaiting Analysis


This vulnerability is currently awaiting analysis.

Description

A security flaw was found in Ansible Tower when requesting an OAuth2 token with an OAuth2 application. Ansible Tower uses the token to provide authentication. This flaw allows an attacker to obtain a refresh token that does not expire. The original token granted to the user still has access to Ansible Tower, which allows any user that can gain access to the token to be fully authenticated to Ansible Tower. This flaw affects Ansible Tower versions before 3.6.4 and Ansible Tower versions before 3.5.6.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-613 Insufficient Session Expiration Red Hat, Inc.  
CWE-287 Improper Authentication Red Hat, Inc.  
CWE-672 Operation on a Resource after Expiration or Release Red Hat, Inc.  

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-10709
NVD Published Date:
05/27/2021
NVD Last Modified:
05/27/2021
Source:
Red Hat, Inc.