Bug 2381589 (CVE-2025-7738) - CVE-2025-7738 python3.11-django-ansible-base: Sensitive Authenticator Secrets Returned in Clear Text via API in AAP
Summary: CVE-2025-7738 python3.11-django-ansible-base: Sensitive Authenticator Secrets...
Keywords:
Status: NEW
Alias: CVE-2025-7738
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-17 05:13 UTC by OSIDB Bzimport
Modified: 2025-08-04 18:00 UTC (History)
19 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:12772 0 None None None 2025-08-04 18:00:10 UTC

Description OSIDB Bzimport 2025-07-17 05:13:02 UTC
A sensitive information disclosure vulnerability exists in the Gateway API of Ansible Automation Platform. When fetching the configuration of certain authenticators (GitHub Enterprise or GitHub Enterprise Org), the API returns the OAuth2 client secret in clear text instead of redacting or masking it (e.g., returning $encrypted$). This flaw is present in the endpoint /api/gateway/v1/authenticators/<authenticator ID>/ and can be reproduced by administrators or auditors with access. While not directly exploitable over the network by unauthorized actors, it exposes a high-value secret that could be misused if accessed by a malicious insider or compromised privileged account.

Comment 2 errata-xmlrpc 2025-08-04 18:00:08 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.5 for RHEL 9
  Red Hat Ansible Automation Platform 2.5 for RHEL 8

Via RHSA-2025:12772 https://access.redhat.com/errata/RHSA-2025:12772


Note You need to log in before you can comment on or make changes to this bug.