{"id":"PYSEC-2013-1","details":"runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.","aliases":["CVE-2013-4259","GHSA-fj24-ghp9-39v3"],"modified":"2023-11-08T03:57:21.468737Z","published":"2013-09-16T19:14:00Z","references":[{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=998223"},{"type":"WEB","url":"http://www.ansible.com/security"},{"type":"WEB","url":"https://groups.google.com/forum/#!topic/ansible-project/UVDYW0HGcNg"}],"affected":[{"package":{"name":"ansible","ecosystem":"PyPI","purl":"pkg:pypi/ansible"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.3"}]}],"versions":["1.0","1.1","1.2","1.2.1","1.2.2"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/ansible/PYSEC-2013-1.yaml"}}],"schema_version":"1.7.3"}