A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
Workaround:
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:9986 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-49520 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2370812 | issue tracking |