Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subjects Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ansible | Redhat | * | 1.9.1 (including) |
Ansible | Ubuntu | esm-infra-legacy/trusty | * |
Ansible | Ubuntu | trusty | * |
Ansible | Ubuntu | trusty/esm | * |
Ansible | Ubuntu | upstream | * |
Ansible | Ubuntu | utopic | * |
Ansible | Ubuntu | vivid | * |