CVE-2025-7738

4.4 MEDIUM

📋 TL;DR

CVE-2025-7738 exposes GitHub Enterprise client secrets in clear text through Ansible Automation Platform's Gateway API. This affects administrators and auditors accessing authenticator configurations, potentially leading to credential leaks. While access is restricted to privileged users, the plaintext exposure increases risk of accidental disclosure or misuse.

💻 Affected Systems

Products:
  • Ansible Automation Platform
  • django-ansible-base
Versions: Specific versions not detailed in CVE; check Red Hat advisories for affected releases
Operating Systems: Linux (RHEL-based deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitHub Enterprise authenticator configurations; other authenticator types are not impacted.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Compromised administrator credentials lead to GitHub Enterprise account takeover, enabling unauthorized access to source code, CI/CD pipelines, and sensitive repositories.

🟠

Likely Case

Accidental credential exposure through logs, screenshots, or misconfigured monitoring tools, potentially leading to credential harvesting by internal or external actors.

🟢

If Mitigated

Limited impact with proper access controls, audit logging, and credential rotation, though clear text exposure remains a security hygiene issue.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrative access to AAP Gateway API endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat Security Advisory RHSA-2025:12772 for specific patched versions

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:12772

Restart Required: Yes

Instructions:

1. Update Ansible Automation Platform to the patched version specified in RHSA-2025:12772. 2. Restart AAP services. 3. Verify GitHub Enterprise authenticator configurations no longer expose secrets in clear text.

🔧 Temporary Workarounds

Restrict API Access

all

Limit access to Gateway API endpoints to only essential administrative users.

Rotate GitHub Enterprise Credentials

all

Immediately rotate any exposed GitHub Enterprise client secrets.

🧯 If You Can't Patch

  • Implement strict access controls and audit logging for all administrative API access.
  • Monitor and alert on any access to authenticator configuration endpoints.

🔍 How to Verify

Check if Vulnerable:

Check if GitHub Enterprise authenticator configurations return client secrets in clear text via Gateway API endpoints.

Check Version:

ansible --version or check AAP control plane version via web UI/API

Verify Fix Applied:

After patching, verify that client secrets are no longer exposed in clear text through the API.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Gateway API authenticator endpoints
  • Administrative user accessing GitHub Enterprise configuration

Network Indicators:

  • API requests to /api/v2/authenticators/ endpoints with GitHub Enterprise parameters

SIEM Query:

source="aap_gateway" AND (uri_path="/api/v2/authenticators/" OR uri_path CONTAINS "github")

🔗 References

📤 Share & Export