CPAN.pm before 2.35 does not verify TLS certificates when...
High severity Unreviewed PublishedApr 29, 2023 to the GitHub Advisory Database • UpdatedJun 21, 2024
Description
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
References
- https://nvd.nist.gov/vuln/detail/CVE-2023-31484
- andk/cpanpm#175
- https://metacpan.org/dist/CPAN/changes
- https://www.openwall.com/lists/oss-security/2023/04/18/14
- http://www.openwall.com/lists/oss-security/2023/04/29/1
- http://www.openwall.com/lists/oss-security/2023/05/03/3
- http://www.openwall.com/lists/oss-security/2023/05/03/5
- http://www.openwall.com/lists/oss-security/2023/05/07/2
- https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB
- https://security.netapp.com/advisory/ntap-20240621-0007
Published by theNational Vulnerability DatabaseApr 29, 2023
Published to the GitHub Advisory DatabaseApr 29, 2023
Last updatedJun 21, 2024
Severity
High / 10
CVSS v3 base metrics
Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS score
(79th percentile)
Weaknesses
CVE ID
CVE-2023-31484
GHSA ID
GHSA-5v8j-jfmm-6x86
Source code
No known source code
Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.
LoadingChecking history
Uh oh!
There was an error while loading.Please reload this page.
See something to contribute?Suggest improvements for this vulnerability.