Vulnerability CVE-2020-15163


Published: 2020-09-09

Description:
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

Type:

CWE-863

(Incorrect Authorization)

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.9/10
4.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Linuxfoundation -> The update framework 

 References:
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7
https://github.com/theupdateframework/tuf/pull/885
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg
https://pypi.org/project/tuf

Copyright 2024, cxsecurity.com

 

Back to Top