Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python314Packages.molecule

Found 3 matching suggestions

View:
Compact
Detailed
Dismissed
Permalink CVE-2025-9909
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Aap-gateway: improper path validation in gateway allows credential exfiltration

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
automation-gateway
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/gateway-rhel8
  • *
ansible-automation-platform-26/gateway-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs
Dismissed
Permalink CVE-2025-9908
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Event-driven-ansible: sensitive internal headers disclosure in aap eda event streams

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and event stream URLs via crafted requests and job templates. By exfiltrating these headers, an attacker could spoof trusted requests, escalate privileges, or perform malicious event injection.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
automation-eda-controller
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/eda-controller-rhel8
  • *
ansible-automation-platform-26/eda-controller-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs
Dismissed
Permalink CVE-2025-9907
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Event-driven-ansible: event stream test mode exposes sensitive headers in aap eda

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Stream API. This vulnerability allows exposure of sensitive client credentials and internal infrastructure headers via the test_headers field when an event stream is in test mode. The possible outcome includes leakage of internal infrastructure details, accidental disclosure of user or system credentials, privilege escalation if high-value tokens are exposed, and persistent sensitive data exposure to all users with read access on the event stream.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
automation-eda-controller
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/eda-controller-rhel8
  • *
ansible-automation-platform-26/eda-controller-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs