{"id":"CVE-2020-15163","details":"Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.","aliases":["GHSA-f8mr-jv2c-v8mg","PYSEC-2020-145"],"modified":"2026-04-10T04:22:50.569886Z","published":"2020-09-09T18:15:22.480Z","related":["GHSA-f8mr-jv2c-v8mg"],"references":[{"type":"ADVISORY","url":"https://github.com/theupdateframework/tuf/releases/tag/v0.12.0"},{"type":"ADVISORY","url":"https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg"},{"type":"FIX","url":"https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7"},{"type":"FIX","url":"https://github.com/theupdateframework/tuf/pull/885"},{"type":"PACKAGE","url":"https://pypi.org/project/tuf"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/theupdateframework/python-tuf","events":[{"introduced":"0"},{"fixed":"3d342e648fbacdf43a13d7ba8886aaaf07334af7"},{"fixed":"61383951147df1dc352bdc95644f8a51c94cd12c"}]},{"type":"GIT","repo":"https://github.com/theupdateframework/tuf","events":[{"introduced":"0"},{"fixed":"61383951147df1dc352bdc95644f8a51c94cd12c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.12.0"}]}}],"versions":["v0.10.0","v0.10.2","v0.11.0","v0.11.1","v0.11.2.dev1","v0.11.2.dev2","v0.11.2.dev3","v0.7.5","v0.9.8","v0.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15163.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"}]}