CPAN 2.28 allows Signature Verification Bypass.
References
Configurations
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html - Exploit, Third Party Advisory | |
References | () https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ - | |
References | () https://metacpan.org/pod/distribution/CPAN/scripts/cpan - Product, Third Party Advisory |
07 Nov 2023, 03:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-12-13 18:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-16156
Mitre link : CVE-2020-16156
CVE.ORG link : CVE-2020-16156
JSON object : View
Products Affected
perl
- comprehensive_perl_archive_network
fedoraproject
- fedora
CWE
CWE-347
Improper Verification of Cryptographic Signature