Skip to main content

CVE-2025-46421: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Medium
VulnerabilityCVE-2025-46421cvecve-2025-46421
Published: Thu Apr 24 2025 (04/24/2025, 13:01:24 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.

AI-Powered Analysis

AILast updated: 08/05/2025, 01:13:54 UTC

Technical Analysis

CVE-2025-46421 is a vulnerability identified in libsoup, a GNOME HTTP client/server library widely used in Linux environments, including Red Hat Enterprise Linux 10. The flaw arises when libsoup clients handle HTTP redirects. Specifically, when an HTTP redirect response is received, the client erroneously forwards the HTTP Authorization header to the new host specified in the redirect. This behavior is problematic because the Authorization header often contains sensitive credentials such as bearer tokens or basic authentication credentials. By sending these credentials to an unintended host, the redirected server can impersonate the user to the original host that issued the redirect, potentially gaining unauthorized access to protected resources. The vulnerability is classified with a CVSS v3.1 score of 6.8 (medium severity), reflecting the significant confidentiality and integrity impact but with some exploitation barriers. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) since the client must follow a redirect. The attack complexity is high (AC:H), indicating that exploitation is not trivial. The scope remains unchanged (S:U), meaning the impact is limited to the vulnerable component. There is no known exploit in the wild at the time of publication. This vulnerability can lead to credential leakage and unauthorized access, undermining trust in HTTP redirects and potentially enabling further attacks such as session hijacking or privilege escalation within affected systems.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems and applications relying on libsoup for HTTP communications, especially those running Red Hat Enterprise Linux 10. Confidential information such as authentication tokens or credentials could be exposed to malicious redirect endpoints, leading to unauthorized access to internal services or sensitive data. This could affect web services, APIs, or internal tools that use libsoup for HTTP requests. The impact is heightened in environments where redirects are common or where users interact with untrusted or external web resources. Organizations in sectors such as finance, healthcare, government, and critical infrastructure could face increased risk due to the sensitivity of their data and regulatory requirements around data protection. Additionally, the vulnerability could be exploited as part of a multi-stage attack chain, facilitating lateral movement or privilege escalation. The medium severity rating suggests that while the vulnerability is serious, exploitation requires specific conditions and user interaction, somewhat limiting widespread impact. However, the potential for credential theft and impersonation means that organizations must address this promptly to maintain security and compliance.

Mitigation Recommendations

To mitigate CVE-2025-46421 effectively, organizations should: 1) Apply patches or updates from Red Hat or the libsoup project as soon as they become available to correct the improper forwarding of Authorization headers during redirects. 2) Implement strict validation and whitelisting of redirect URLs within applications to prevent redirects to untrusted or external domains. 3) Configure HTTP clients or applications using libsoup to disable automatic forwarding of Authorization headers on redirects where possible. 4) Employ network-level controls such as web proxies or firewalls to monitor and restrict suspicious redirect traffic. 5) Educate users and developers about the risks of following untrusted redirects and encourage cautious behavior when interacting with web resources. 6) Conduct security audits and penetration testing focusing on HTTP redirect handling and authorization header exposure. 7) Monitor logs for anomalous authentication attempts or unusual redirect patterns that could indicate exploitation attempts. These steps go beyond generic advice by focusing on configuration changes, user awareness, and proactive monitoring tailored to the specifics of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-24T01:37:42.413Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb079

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 8/5/2025, 1:13:54 AM

Last updated: 8/18/2025, 1:22:23 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats