Vulnerability Description
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pulpproject | Pulp Ansible | - |
| Redhat | Ansible Automation Platform | 2.0 |
| Redhat | Satellite | 6.0 |
| Redhat | Update Infrastructure | 3.0 |
Related Weaknesses (CWE)
References
- https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234ExploitThird Party Advisory
- https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234ExploitThird Party Advisory
FAQ
What is CVE-2022-3644?
CVE-2022-3644 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
How severe is CVE-2022-3644?
CVE-2022-3644 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3644?
Check the references section above for vendor advisories and patch information. Affected products include: Pulpproject Pulp Ansible, Redhat Ansible Automation Platform, Redhat Satellite, Redhat Update Infrastructure.