CVE-2020-16154
Published: 13 December 2021
The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.
Mitigation
This issue can be mitigated if cpanminus is only used with trusted CPAN mirrors (https://www.cpan.org/ or https://cpan.metacpan.org/), ensuring that HTTPS is used for communication with the server. cpanm command can be used with --from option to specify the CPAN mirror as in 'cpnam --from https://www.cpan.org/' or the environment variable PERL_CPANM_OPT can be set to "--from https://www.cpan.org".
Priority
Status
Package | Release | Status |
---|---|---|
cpanminus Launchpad, Ubuntu, Debian |
bionic |
Released
(1.7043-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
focal |
Released
(1.7044-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Released
(1.7045-1)
|
|
kinetic |
Not vulnerable
(1.7045-1)
|
|
lunar |
Not vulnerable
(1.7045-1)
|
|
mantic |
Not vulnerable
(1.7045-1)
|
|
noble |
Not vulnerable
(1.7045-1)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(1.7045-1)
|
|
xenial |
Released
(1.7040-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
Patches: upstream: https://github.com/miyagawa/cpanminus/commit/d42af8247d18671a1ed0fe93050fb979bd9b4e80 upstream: https://github.com/miyagawa/cpanminus/commit/f5dfc58d8dd8632a68f11d5360209254b266921d upstream: https://github.com/miyagawa/cpanminus/commit/18d31a8123c2fefcf968c9b9b1c942b6ab7e93ba |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |