6.7

CVE-2025-9909

Aap-gateway: improper path validation in gateway allows credential exfiltration

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RedhatAnsible Automation Platform Version < 2.6
   RedhatEnterprise Linux Version8.0
   RedhatEnterprise Linux Version9.0
RedhatAnsible Developer Version1.2
   RedhatEnterprise Linux Version8.0
   RedhatEnterprise Linux Version9.0
RedhatAnsible Developer Version1.3
   RedhatEnterprise Linux Version8.0
   RedhatEnterprise Linux Version9.0
RedhatAnsible Inside Version1.3
   RedhatEnterprise Linux Version8.0
   RedhatEnterprise Linux Version9.0
RedhatAnsible Inside Version1.4
   RedhatEnterprise Linux Version8.0
   RedhatEnterprise Linux Version9.0
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.002
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secalert@redhat.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-647 Use of Non-Canonical URL Paths for Authorization Decisions

The product defines policy namespaces and makes authorization decisions based on the assumption that a URL is canonical. This can allow a non-canonical URL to bypass the authorization.