NA

CVE-2023-31484

Published: 29/04/2023 Updated: 07/11/2023
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

CPAN.pm prior to 2.35 does not verify TLS certificates when downloading distributions over HTTPS.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cpanpm project cpanpm

perl perl

Vendor Advisories

Synopsis Moderate: perl-CPAN security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for perl-CPAN is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having ...
Debian Bug report logs - #1035109 perl: CVE-2023-31484 Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 29 Apr 2023 20:21:01 UTC Severity: normal Tags: security, upstream Found in version perl/5360-7 Forwarded to https:/ ...
Debian Bug report logs - #954089 perl: CVE-2023-31486 Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Felix Lechner <felixlechner@lease-upcom> Date: Mon, 16 Mar 2020 15:33:02 UTC Severity: important Tags: fixed-upstream, security, upstream Found in version perl/5360-7 F ...
HTTP::Tiny 0082, a Perl core module since 5139 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates (CVE-2023-31484) ...
HTTP::Tiny 0082, a Perl core module since 5139 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates (CVE-2023-31484) ...