First published: Mon Feb 04 2019(Updated: )
Erlang/OTP Rebar3 version 3.7.0 through 3.7.5 contains a Signing oracle vulnerability in Package registry verification that can result in Package modifications not detected, allowing code execution. This attack appears to be exploitable via Victim fetches packages from malicious/compromised mirror. This vulnerability appears to have been fixed in 3.8.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Erlang Rebar3 | >=3.7.0<=3.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1000014 is rated as a critical severity vulnerability due to the potential for code execution.
To fix CVE-2019-1000014, upgrade Erlang/OTP Rebar3 to version 3.7.6 or later.
CVE-2019-1000014 is caused by a Signing oracle vulnerability in the package registry verification process.
Erlang/OTP Rebar3 versions 3.7.0 through 3.7.5 are affected by CVE-2019-1000014.
Yes, CVE-2019-1000014 can be exploited when a victim fetches packages from a malicious or compromised mirror.