Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/07/14/4 | Mailing List |
http://www.ansible.com/security | Vendor Advisory |
http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html |
Configurations
Information
Published : 2015-08-12 07:59
Updated : 2019-09-16 08:15
NVD link : CVE-2015-3908
Mitre link : CVE-2015-3908
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
redhat
- ansible