Description
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1923-1 | ansible security update |
EUVD |
EUVD-2015-0001 | Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
Github GHSA |
GHSA-w64c-pxjj-h866 | Ansible does not verify that the server hostname matches a domain name in certificates |
Ubuntu USN |
USN-7330-1 | Ansible vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T05:56:16.144Z
Reserved: 2015-05-12T00:00:00.000Z
Link: CVE-2015-3908
No data.
Status : Modified
Published: 2015-08-12T14:59:21.697
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-3908
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN