CVE-2020-15163: Insufficient Verification of Data Authenticity
(updated )
Python TUF (The Update Framework) reference implementation it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed and newer.
References
- github.com/advisories/GHSA-f8mr-jv2c-v8mg
- github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7
- github.com/theupdateframework/tuf/pull/885
- github.com/theupdateframework/tuf/releases/tag/v0.12.0
- github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg
- nvd.nist.gov/vuln/detail/CVE-2020-15163
- pypi.org/project/tuf
Detect and mitigate CVE-2020-15163 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →