Vulnerability Name: | CVE-2020-16156 (CCN-215691) | ||||||||||||
Assigned: | 2020-07-30 | ||||||||||||
Published: | 2021-11-23 | ||||||||||||
Updated: | 2022-04-01 | ||||||||||||
Summary: | CPAN 2.28 allows Signature Verification Bypass. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-347 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: CCN Type: Neil Bowers Blog, November 23, 2021 6:00 PM Addressing CPAN vulnerabilities related to checksums Source: MISC Type: Exploit, Third Party Advisory http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html Source: MITRE Type: CNA CVE-2020-16156 Source: CCN Type: CPAN Web site CPAN Source: CCN Type: Hackeriet Blog, 23/11/21 Signature Verification Vulnerabilities in CPAN.pm, cpanminus and CPAN::Checksums Source: MISC Type: Exploit, Third Party Advisory https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ Source: XF Type: UNKNOWN perl-cpan-cve202016156-sec-bypass(215691) Source: FEDORA Type: Third Party Advisory FEDORA-2022-84fd87f7eb Source: FEDORA Type: Third Party Advisory FEDORA-2022-21e8372c42 Source: MISC Type: Product, Third Party Advisory https://metacpan.org/pod/distribution/CPAN/scripts/cpan | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |