CVE-2020-15163

Source
https://cve.org/CVERecord?id=CVE-2020-15163
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15163.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15163
Aliases
Related
Published
2020-09-09T18:15:22.480Z
Modified
2026-03-13T22:01:22.607255Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

References

Affected packages

Git / github.com/theupdateframework/python-tuf

Affected ranges

Type
GIT
Repo
https://github.com/theupdateframework/python-tuf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/theupdateframework/tuf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "0.12.0"
        }
    ]
}

Affected versions

v0.*
v0.10.0
v0.10.1
v0.10.2
v0.11.0
v0.11.1
v0.11.2.dev1
v0.11.2.dev2
v0.11.2.dev3
v0.7.5
v0.9.8
v0.9.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15163.json"