CVE-2020-15163

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15163
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15163.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15163
Aliases
Related
Withdrawn
2025-05-28T13:08:03.041005Z
Published
2020-09-09T18:15:22Z
Modified
2025-02-19T03:08:28.831684Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

References

Affected packages

Git / github.com/theupdateframework/python-tuf

Affected ranges

Type
GIT
Repo
https://github.com/theupdateframework/python-tuf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/theupdateframework/tuf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.10.0
v0.10.1
v0.10.2
v0.11.0
v0.11.1
v0.11.2.dev1
v0.11.2.dev2
v0.11.2.dev3
v0.7.5
v0.9.8
v0.9.9