# Simple-Ansible-for-CVE-2023-20198
This is a very simple playbook to detect and disable http/https server to prevent the vulnerability.
## Getting started
Simply use the Cisco Always on Sandbox to test example
1. Log into sandbox router and turn on http/https server
```
ssh developer@sandbox-iosxe-recomm-1.cisco.com
pass=lastorangerestoreball8876
```
```
conf t
ip http server
ip http secure-server
```
2. Run the http.yml playbook to determine the state of the config and to disable Http/Https server
The syslog output will be empty if the sandbox router hasn't been exploited.
3. Run Playbook again
This time it should skip the third task becuase of the conditional
## PSIRT Reference
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
[4.0K] /data/pocs/a3dc702c1119b9364801c2316232d10bb3fb5f61
├── [1.3K] http.yml
└── [ 819] README.md
0 directories, 2 files