← Retour aux CVEs
CVE-2020-15163
HIGH8.7
Description
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Details CVE
Score CVSS v3.18.7
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie9/9/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
linuxfoundation:the_update_framework
Faiblesses (CWE)
CWE-863CWE-345
References
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7(security-advisories@github.com)
https://github.com/theupdateframework/tuf/pull/885(security-advisories@github.com)
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0(security-advisories@github.com)
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg(security-advisories@github.com)
https://pypi.org/project/tuf(security-advisories@github.com)
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/theupdateframework/tuf/pull/885(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg(af854a3a-2127-422b-91ae-364da2661108)
https://pypi.org/project/tuf(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.