First published: Sun Aug 18 2013(Updated: )
`runner/connection_plugins/ssh.py` in Ansible before 1.2.3, when using `ControlPersist`, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in `/tmp/`.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Ansible | <1.2.3 | 1.2.3 |
Red Hat Ansible | <=1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4259 has a moderate severity due to the potential for local users to conduct symlink attacks.
To fix CVE-2013-4259, upgrade to Ansible version 1.2.3 or later.
CVE-2013-4259 affects Ansible versions prior to 1.2.3.
The impact of CVE-2013-4259 allows local users to redirect SSH sessions, compromising session integrity.
A potential workaround for CVE-2013-4259 is to configure a different socket file location than the predictable '/tmp/'.