Vulnerability Description
runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Ansible | <= 1.2.2 |
Related Weaknesses (CWE)
References
- http://www.ansible.com/securityVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=998223Issue TrackingPatch
- https://groups.google.com/forum/#%21topic/ansible-project/UVDYW0HGcNg
- http://www.ansible.com/securityVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=998223Issue TrackingPatch
- https://groups.google.com/forum/#%21topic/ansible-project/UVDYW0HGcNg
FAQ
What is CVE-2013-4259?
CVE-2013-4259 is a vulnerability with a CVSS score of 1.9 (LOW). runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/...
How severe is CVE-2013-4259?
CVE-2013-4259 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4259?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ansible.