Unauthorized access and impersonation can occur in versions 4.6.2.3226 and below of Progress Software's Hybrid Data Pipeline Server on Linux. This vulnerability allows attackers to combine credentials from different sources, potentially leading to client impersonation and unauthorized access.
When OAuth Clients perform an OAuth handshake with the Hybrid Data Pipeline Server, the server accepts client credentials from both HTTP headers and request parameters.
References
Configurations
Configuration 1 (hide)
AND |
|
History
02 Oct 2025, 17:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.progress.com/s/article/DataDirect-Hybrid-Data-Pipeline-Critical-Security-Product-Alert-Bulletin-July-2025---CVE-2025-6505 - Vendor Advisory | |
Summary |
|
|
First Time |
Linux linux Kernel
Progress hybrid Data Pipeline Progress Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:progress:hybrid_data_pipeline:*:*:*:*:*:*:*:* |
29 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 |
29 Jul 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-29 13:15
Updated : 2025-10-02 17:40
NVD link : CVE-2025-6505
Mitre link : CVE-2025-6505
CVE.ORG link : CVE-2025-6505
JSON object : View
Products Affected
linux
- linux_kernel
progress
- hybrid_data_pipeline
CWE
CWE-287
Improper Authentication