Description
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
References
https://github.com/theupdateframework/tuf/pull/885
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0
https://github.com/theupdateframework/tuf/pull/885
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
8.7 · High
Information
Source identifier
Vulnerability status
Modified
Published
2020-09-09T16:15:22.480Z
5 years agoLast modified
2024-11-21T04:04:58.837Z
1 year ago