{"id":"CVE-2015-3908","details":"Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","aliases":["GHSA-w64c-pxjj-h866","PYSEC-2015-1"],"modified":"2026-04-16T06:17:08.072459753Z","published":"2015-08-12T14:59:21Z","related":["openSUSE-SU-2024:10326-1","openSUSE-SU-2024:14244-1","openSUSE-SU-2024:14536-1","openSUSE-SU-2025:15605-1","openSUSE-SU-2025:15753-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html"},{"type":"ADVISORY","url":"http://www.ansible.com/security"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/07/14/4"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html"}],"schema_version":"1.7.5"}