CVE-2020-15163

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
CVSS v2 : 4.9
v3 : 8.2
v2 : 4.9
v3 : 8.7
References () https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7 - Broken Link () https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7 - Broken Link
References () https://github.com/theupdateframework/tuf/pull/885 - Patch, Third Party Advisory () https://github.com/theupdateframework/tuf/pull/885 - Patch, Third Party Advisory
References () https://github.com/theupdateframework/tuf/releases/tag/v0.12.0 - Third Party Advisory () https://github.com/theupdateframework/tuf/releases/tag/v0.12.0 - Third Party Advisory
References () https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg - Third Party Advisory () https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg - Third Party Advisory
References () https://pypi.org/project/tuf - Product, Vendor Advisory () https://pypi.org/project/tuf - Product, Vendor Advisory

Information

Published : 2020-09-09 18:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-15163

Mitre link : CVE-2020-15163

CVE.ORG link : CVE-2020-15163


JSON object : View

Products Affected

linuxfoundation

  • the_update_framework
CWE
CWE-863

Incorrect Authorization

CWE-345

Insufficient Verification of Data Authenticity