Vulnerability Name: | CVE-2020-16154 (CCN-215701) | ||||||||||||
Assigned: | 2020-07-30 | ||||||||||||
Published: | 2021-11-23 | ||||||||||||
Updated: | 2022-03-01 | ||||||||||||
Summary: | The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-347 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: CCN Type: Neil Bowers Blog, November 23, 2021 6:00 PM Addressing CPAN vulnerabilities related to checksums Source: MITRE Type: CNA CVE-2020-16154 Source: CCN Type: CPAN Web site CPAN Source: CCN Type: Hackeriet Blog, 23/11/21 Signature Verification Vulnerabilities in CPAN.pm, cpanminus and CPAN::Checksums Source: MISC Type: Exploit, Third Party Advisory https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ Source: XF Type: UNKNOWN perl-cpan-cve202016154-sec-bypass(215701) Source: CCN Type: CPAN GIT Repository CPAN::Checksums package Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-f4b7f896e3 Source: MISC Type: Product, Third Party Advisory https://metacpan.org/pod/App::cpanminus | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |