LOW · 1.9

CVE-2013-4259

runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/...

Vulnerability Description

runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.

CVSS Score

1.9

LOW

AV:L/AC:M/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
RedhatAnsible<= 1.2.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-4259?

CVE-2013-4259 is a vulnerability with a CVSS score of 1.9 (LOW). runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/...

How severe is CVE-2013-4259?

CVE-2013-4259 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-4259?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ansible.