A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
Workaround:
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:4439 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4440 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4508 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4538 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4560 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4568 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4609 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:4624 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:7436 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:7505 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-46421 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2361962 | issue tracking |