Vulnerability CVE-2013-4259


Published: 2013-09-16   Modified: 2013-09-18

Description:
runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.9/10
2.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Redhat -> Ansible 
Ansibleworks -> Ansible 

 References:
http://www.ansible.com/security
https://bugzilla.redhat.com/show_bug.cgi?id=998223
https://groups.google.com/forum/#!topic/ansible-project/UVDYW0HGcNg

Copyright 2024, cxsecurity.com

 

Back to Top