RHEL 8 / 9 : Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update (Moderate) (RHSA-2025:2518)

medium Nessus Plugin ID 232781

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 8 / 9 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2025:2518 advisory.

Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.

Security Fix(es):

* automation-gateway: Mutation XSS in DOMPurify Due to Improper Template Literal Handling (CVE-2025-26791)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Updates and fixes included:

Automation Platform
* Fixed an issue that would prevent some types of resources from getting synced if there was a naming conflict (AAP-41241)
* Fixed an issue where login would fail for users who were members of a team or organization that had a naming conflict (AAP-41240)
* Fixed an issue in the user collection module where running with state: present would cause a stack trace (AAP-40887)
* Fixed an issue preventing the controller admin password to get set for the gateway admin account during upgrades (AAP-40839)
* Fixed an issue that caused updates to SAML authenticators to ignore an updated public certificate provided via UI or API and then fail with the message The certificate and private key do not match (AAP-40767)
* Allow services to request cloud.redhat.com settings from gateway using ServiceTokenAuth (AAP-39649)
* Fixed ServiceAuthToken destroy method to allow HTTP delete via ServiceAuth to work properly (AAP-37630)
* automation-gateway has been updated to 2.5.20250312
* python3.11-django-ansible-base has been updated to 2.5.20250312

Automation controller
* Fixed the indirect host counting name to not record the hostname, but from the query result instead (AAP-41033)
* Fixed OpaClient to initialize properly after timeouts and retries (AAP-40997)
* Added service account credentials for Analytics in controller (AAP-40769)
* Added a helper method in the API for fetching the service account token from sso.redhat.com (AAP-39637)
* automation-controller has been updated to 4.6.9

Event-Driven Ansible
* Fixed ansible-rulebook support for third party python libraries (AAP-41341)
* Modified the behavior of the ansible-rulebook and Event-Driven Ansible to help with issues when the activation correctly started was considered unresponsive and scheduled for restarting (AAP-41070)
* Added support for editing and copying of rulebook activations in the API (AAP-40254)
* Rulebook activations' log message field is separated into timestamps and message fields (AAP-39743)
* Fixed a bug where the activation was incorrectly restarted with the error message Missing container for running activation (AAP-39545)
* Event streams now connect to PostgreSQL by using the certificates configured at the installation (AAP-39294)
* User is now required to give a user defined name when copying a credential. The new credential name must be unique (AAP-39079)
* Enhanced error messages related to Decision Environments (AAP-38941)
* Decision environment urls are now validated against OCI specification to ensure successful authentication to the container registry when pulling the image (AAP-38822)
* ansible-rulebook has been updated to 1.1.3
* automation-eda-controller has been updated to 1.1.6

Receptor:
* Fixed an issue where receptor was creating too many inotify processes, and where the user would encounter a too many open files error (AAP-22605)
* receptor has been updated to 1.5.3

Container-based Ansible Automation Platform
* Corrected the URL in the postinstall code for automation hub to use the gateway proxy URL (AAP-41306)
* Deprecated the variables eda_main_url and hub_main_url in favor of the gateway proxy URL (AAP-41306)
* Receptor mesh connections are now created between all automation controller nodes (AAP-41102)
* Fixed receptor configuration related to the container group instances type (AAP-40431)
* Fixed behavior that would hide the errors during EDA status validation (AAP-40021)
* Ensure the polkit RPM package is installed in order to enable user lingering (AAP-39860)
* containerized installer setup has been updated to 2.5-11

RPM-based Ansible Automation Platform
* Fixed an issue where SELinux relabeling didn't happen when fcontext rules were changed (AAP-40489)
* Fixed an issue where the credentials for execution environments and decision environments hosted in automation hub were incorrectly configured (AAP-40419)
* Fixed an issue where projects failed to sync due to incorrectly configured credentials for ansible collections hosted in automation hub (AAP-40418)
* Managed CA will now correctly assign eligible groups during discovery during installation, backup and restore (AAP-40277)
* Implemented argument to collect sosreport using the setup script (AAP-40085)
* EDA Activation logging is now provided via the journald driver (AAP-39745)
* ansible-automation-platform-installer and installer setup have been updated to 2.5-9

Additional changes:
* ansible-creator has been updated to 25.0.0
* ansible-dev-environment has been updated to 25.1.0
* ansible-dev-tools has been updated to 25.2.0
* ansible-lint has been updated to 25.1.2
* ansible-navigator has been updated to 25.1.0
* automation-hub has been updated to 4.10.2
* molecule has been updated to 25.2.0
* python3.11-ansible-compat has been updated to 25.1.2
* python3.11-galaxy-importer has been updated to 0.4.28
* python3.11-galaxy-ng has been updated to 4.10.2
* python3.11-jsonschema-path has been updated to 0.3.4
* python3.11-podman has been updated to 5.2.0
* python3.11-pytest-ansible has been updated to 25.1.0
* python3.11-referencing has been updated to 0.36.2
* python3.11-tox-ansible has been updated to 25.1.0
* python3.11-typing-extensions has been updated to 4.9.0

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected automation-gateway-server package.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=2345695

http://www.nessus.org/u?54804c74

https://access.redhat.com/errata/RHSA-2025:2518

Plugin Details

Severity: Medium

ID: 232781

File Name: redhat-RHSA-2025-2518.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/15/2025

Updated: 3/15/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2025-26791

CVSS v3

Risk Factor: Medium

Base Score: 4.5

Temporal Score: 3.9

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:automation-gateway-server, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/10/2025

Vulnerability Publication Date: 2/14/2025

Reference Information

CVE: CVE-2025-26791

CWE: 79

RHSA: 2025:2518