Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-3971: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Red Hat Red Hat Ansible Automation Platform 2.3 for RHEL 8

0
High
VulnerabilityCVE-2023-3971cvecve-2023-3971
Published: Wed Oct 04 2023 (10/04/2023, 14:26:01 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Ansible Automation Platform 2.3 for RHEL 8

Description

An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.

AI-Powered Analysis

AILast updated: 10/10/2025, 00:53:17 UTC

Technical Analysis

CVE-2023-3971 is an HTML injection vulnerability identified in the Controller component of Red Hat Ansible Automation Platform 2.3 running on Red Hat Enterprise Linux 8. The vulnerability arises from improper neutralization of script-related HTML tags within the user interface settings, allowing an attacker to inject arbitrary HTML code. This injection can be leveraged to craft a malicious login page that deceives legitimate users into submitting their credentials, effectively enabling credential theft. The attack requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), meaning the victim must interact with the malicious content for exploitation to succeed. The vulnerability impacts confidentiality and integrity severely by enabling credential capture and potential full system compromise, though it does not affect availability. The CVSS 3.1 base score is 7.3, reflecting a high severity with network attack vector, low attack complexity, and no requirement for privileges beyond limited user rights. No public exploits have been reported yet, but the risk remains significant due to the critical nature of the Ansible Automation Platform in enterprise environments. The flaw underscores the importance of secure input handling in web interfaces, especially in automation tools that manage critical infrastructure and workflows.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the security of automation workflows and infrastructure managed via Red Hat Ansible Automation Platform. Successful exploitation can lead to credential theft, enabling attackers to gain unauthorized access to automation controllers and potentially pivot to other systems within the network. This can result in data breaches, unauthorized changes to automation scripts, and disruption of IT operations. Given the widespread use of Red Hat products in European enterprises, including government, finance, and manufacturing sectors, the impact could be significant. The compromise of automation platforms can undermine trust in IT processes and lead to regulatory compliance issues under GDPR due to potential exposure of personal data. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score necessitates urgent attention.

Mitigation Recommendations

1. Apply official patches or updates from Red Hat as soon as they are released to address CVE-2023-3971. 2. Until patches are available, restrict access to the Ansible Automation Platform Controller UI to trusted networks and users only, using network segmentation and firewall rules. 3. Implement strict input validation and sanitization on all user interface settings to prevent HTML/script injection. 4. Enable multi-factor authentication (MFA) for all users accessing the Controller to reduce the risk of credential misuse. 5. Monitor logs and user interface configurations for unusual changes or injection attempts. 6. Educate users about phishing risks and the importance of verifying login pages to prevent credential disclosure. 7. Regularly audit automation platform configurations and access controls to detect and remediate unauthorized modifications. 8. Employ web application firewalls (WAF) with rules targeting HTML injection patterns to provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-07-27T07:24:40.604Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557bba0e608b4fb1ee74

Added to database: 10/10/2025, 12:38:19 AM

Last enriched: 10/10/2025, 12:53:17 AM

Last updated: 10/16/2025, 12:58:39 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats