{"id":"CVE-2013-4259","details":"runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.","aliases":["GHSA-fj24-ghp9-39v3","PYSEC-2013-1"],"modified":"2026-04-10T03:42:56.358260Z","published":"2013-09-16T19:14:39Z","references":[{"type":"ADVISORY","url":"http://www.ansible.com/security"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=998223"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=998223"},{"type":"WEB","url":"https://groups.google.com/forum/#%21topic/ansible-project/UVDYW0HGcNg"}],"schema_version":"1.7.5"}