First published: Wed Jul 03 2013(Updated: )
A security flaw was found in the way Ansible, a SSH-based configuration management, deployment, and task execution system, performed remote server's SSH host key management (previously ability to store known SSH server's host keys to local cache was not supported). A remote attacker could use this flaw to conduct man-in-the-middle (MiTM) attacks against the Ansible task execution system user. References: [1] <a href="http://www.openwall.com/lists/oss-security/2013/07/01/2">http://www.openwall.com/lists/oss-security/2013/07/01/2</a> [2] <a href="http://www.openwall.com/lists/oss-security/2013/07/02/6">http://www.openwall.com/lists/oss-security/2013/07/02/6</a> Upstream bug (no upstream patch as of 2013-07-03): [3] <a href="https://github.com/ansible/ansible/issues/857">https://github.com/ansible/ansible/issues/857</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible | <1.2.1 | |
pip/ansible | <1.2.1 | 1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2233 is a vulnerability in Ansible that makes it easier for remote attackers to conduct man-in-the-middle attacks.
CVE-2013-2233 affects Ansible before version 1.2.1.
The severity of CVE-2013-2233 is high with a CVSS score of 7.4.
Remote attackers can exploit CVE-2013-2233 by leveraging a failure to cache SSH host keys, allowing them to conduct man-in-the-middle attacks.
Yes, there are references available for CVE-2013-2233. You can find them at the following links: [link1](http://www.openwall.com/lists/oss-security/2013/07/01/2), [link2](http://www.openwall.com/lists/oss-security/2013/07/02/6), [link3](https://bugzilla.redhat.com/show_bug.cgi?id=980821).