First published: Wed Oct 16 2024(Updated: )
A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. A malicious user could use it to perform actions to impact users by using the "?next=" in a URL and hence redirecting, injecting malicious script, stealing session and data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
redhat ANSIBLE automation platform | =2.5 | |
Red Hat Ansible Developer | =1.2 | |
Red Hat Ansible Inside | =1.3 | |
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10033 is classified as a Cross-site Scripting (XSS) vulnerability, which can lead to significant security risks for affected applications.
To fix CVE-2024-10033, it is recommended to update the affected software components to the latest patched versions provided by Red Hat.
CVE-2024-10033 affects Red Hat Ansible Automation Platform 2.5, Red Hat Ansible Developer 1.2, and Red Hat Ansible Inside 1.3.
Exploitation of CVE-2024-10033 allows a malicious user to inject scripts into web pages viewed by other users, leading to potential data theft or session hijacking.
CVE-2024-10033 does not affect Red Hat Enterprise Linux versions 8.0 and 9.0.