Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-28086
HistoryDec 09, 2020 - 12:00 a.m.

CVE-2020-28086

2020-12-0900:00:00
ubuntu.com
ubuntu.com
15

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

35.9%

pass through 1.7.3 has a possibility of using a password for an unintended
resource. For exploitation to occur, the user must do a git pull, decrypt a
password, and log into a remote service with the password. If an attacker
controls the central Git server or one of the other members’ machines, and
also controls one of the services already in the password store, they can
rename one of the password files in the Git repository to something else:
pass doesn’t correctly verify that the content of a file matches the
filename, so a user might be tricked into decrypting the wrong password and
sending that to a service that the attacker controls. NOTE: for
environments in which this threat model is of concern, signing commits can
be a solution.

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

35.9%

Related for UB:CVE-2020-28086