Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestion detail

Untriaged
Permalink CVE-2025-9908
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 4 weeks ago Activity log
  • Created suggestion
Event-driven-ansible: sensitive internal headers disclosure in aap eda event streams

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and event stream URLs via crafted requests and job templates. By exfiltrating these headers, an attacker could spoof trusted requests, escalate privileges, or perform malicious event injection.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
automation-eda-controller
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/eda-controller-rhel8
  • *
ansible-automation-platform-26/eda-controller-rhel9
  • *

Matching in nixpkgs

Package maintainers