Vulnerability Details CVE-2019-10311
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 24.7%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 4.0
Products affected by CVE-2019-10311
-
cpe:2.3:a:jenkins:ansible_tower:0.5.0
-
cpe:2.3:a:jenkins:ansible_tower:0.5.1
-
cpe:2.3:a:jenkins:ansible_tower:0.5.2
-
cpe:2.3:a:jenkins:ansible_tower:0.5.3
-
cpe:2.3:a:jenkins:ansible_tower:0.5.4
-
cpe:2.3:a:jenkins:ansible_tower:0.6.0
-
cpe:2.3:a:jenkins:ansible_tower:0.6.1
-
cpe:2.3:a:jenkins:ansible_tower:0.7.0
-
cpe:2.3:a:jenkins:ansible_tower:0.8.0
-
cpe:2.3:a:jenkins:ansible_tower:0.8.1
-
cpe:2.3:a:jenkins:ansible_tower:0.8.2
-
cpe:2.3:a:jenkins:ansible_tower:0.8.3
-
cpe:2.3:a:jenkins:ansible_tower:0.8.4
-
cpe:2.3:a:jenkins:ansible_tower:0.8.5
-
cpe:2.3:a:jenkins:ansible_tower:0.8.6
-
cpe:2.3:a:jenkins:ansible_tower:0.8.7
-
cpe:2.3:a:jenkins:ansible_tower:0.9.0
-
cpe:2.3:a:jenkins:ansible_tower:0.9.1