rhsa-2025:16747
Vulnerability from csaf_redhat
Published
2025-09-25 11:13
Modified
2025-10-01 02:31
Summary
Red Hat Security Advisory: Red Hat Developer Hub 1.6.5 release.
Notes
Topic
Red Hat Developer Hub 1.6.5 has been released.
Details
Red Hat Developer Hub (RHDH) is Red Hat's enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Developer Hub 1.6.5 has been released.", "title": "Topic" }, { "category": "general", "text": "Red Hat Developer Hub (RHDH) is Red Hat\u0027s enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:16747", "url": "https://access.redhat.com/errata/RHSA-2025:16747" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-58754", "url": "https://access.redhat.com/security/cve/CVE-2025-58754" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "external", "summary": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh", "url": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh" }, { "category": "external", "summary": "https://developers.redhat.com/rhdh/overview", "url": "https://developers.redhat.com/rhdh/overview" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_developer_hub", "url": "https://docs.redhat.com/en/documentation/red_hat_developer_hub" }, { "category": "external", "summary": "https://issues.redhat.com/browse/RHIDP-8805", "url": "https://issues.redhat.com/browse/RHIDP-8805" }, { "category": "external", "summary": "https://issues.redhat.com/browse/RHIDP-8806", "url": "https://issues.redhat.com/browse/RHIDP-8806" }, { "category": "external", "summary": "https://issues.redhat.com/browse/RHIDP-8811", "url": "https://issues.redhat.com/browse/RHIDP-8811" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16747.json" } ], "title": "Red Hat Security Advisory: Red Hat Developer Hub 1.6.5 release.", "tracking": { "current_release_date": "2025-10-01T02:31:34+00:00", "generator": { "date": "2025-10-01T02:31:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2025:16747", "initial_release_date": "2025-09-25T11:13:18+00:00", "revision_history": [ { "date": "2025-09-25T11:13:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-25T11:13:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-01T02:31:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Hub 1.6", "product": { "name": "Red Hat Developer Hub 1.6", "product_id": "Red Hat Developer Hub 1.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhdh:1.6::el9" } } } ], "category": "product_family", "name": "Red Hat Developer Hub" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64", "product": { "name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64", "product_id": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64", "product_identification_helper": { "purl": "pkg:oci/rhdh-hub-rhel9@sha256%3A7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1.6.4-1758729326" } } }, { "category": "product_version", "name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64", "product": { "name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64", "product_id": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64", "product_identification_helper": { "purl": "pkg:oci/rhdh-rhel9-operator@sha256%3A533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1.6.4-1758727965" } } }, { "category": "product_version", "name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "product": { "name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "product_id": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "product_identification_helper": { "purl": "pkg:oci/rhdh-operator-bundle@sha256%3A3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1.6.4-1758734301" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64 as a component of Red Hat Developer Hub 1.6", "product_id": "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64" }, "product_reference": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64", "relates_to_product_reference": "Red Hat Developer Hub 1.6" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64 as a component of Red Hat Developer Hub 1.6", "product_id": "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64" }, "product_reference": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "relates_to_product_reference": "Red Hat Developer Hub 1.6" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64 as a component of Red Hat Developer Hub 1.6", "product_id": "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64" }, "product_reference": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64", "relates_to_product_reference": "Red Hat Developer Hub 1.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-58754", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-09-12T02:00:53.897605+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2394735" } ], "notes": [ { "category": "description", "text": "Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: \u0027stream\u0027`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: Axios DoS via lack of data size check", "title": "Vulnerability summary" }, { "category": "other", "text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64" ], "known_not_affected": [ "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-58754" }, { "category": "external", "summary": "RHBZ#2394735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-58754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593", "url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593" }, { "category": "external", "summary": "https://github.com/axios/axios/pull/7011", "url": "https://github.com/axios/axios/pull/7011" }, { "category": "external", "summary": "https://github.com/axios/axios/releases/tag/v1.12.0", "url": "https://github.com/axios/axios/releases/tag/v1.12.0" }, { "category": "external", "summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj", "url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj" } ], "release_date": "2025-09-12T01:16:40.513000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-25T11:13:18+00:00", "details": "For more about Red Hat Developer Hub, see References links", "product_ids": [ "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16747" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64", "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:7498105e03c741dd2ac9c39ad4ff9f22c4fee7dd40b2fd9c599996a7e67b3562_amd64", "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:3b2cf972e1ced0a46d3559da4eb1a1b32c50457293ede4958a13538a84b45316_amd64", "Red Hat Developer Hub 1.6:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:533a3b5795440fb9a6d3baac83a69fab4ac0cd9cc02c9278eb3f764f769e60a9_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: Axios DoS via lack of data size check" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…