CPAN 2.28 allows Signature Verification Bypass.
References
Link | Resource |
---|---|
https://metacpan.org/pod/distribution/CPAN/scripts/cpan | Product Third Party Advisory |
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ | Exploit Third Party Advisory |
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ | Third Party Advisory |
Configurations
Information
Published : 2021-12-13 10:15
Updated : 2022-04-01 06:26
NVD link : CVE-2020-16156
Mitre link : CVE-2020-16156
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
perl
- comprehensive_perl_archive_network
fedoraproject
- fedora