Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2025-9909
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Aap-gateway: improper path validation in gateway allows credential exfiltration

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
automation-gateway
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/gateway-rhel8
  • *
ansible-automation-platform-26/gateway-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs