{"api_version":"1","generated_at":"2026-04-23T02:16:51+00:00","cve":"CVE-2023-31484","urls":{"html":"https://cve.report/CVE-2023-31484","api":"https://cve.report/api/cve/CVE-2023-31484.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-31484","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-31484"},"summary":{"title":"CVE-2023-31484","description":"CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-04-29 00:15:00","updated_at":"2023-11-07 04:14:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"https://www.openwall.com/lists/oss-security/2023/04/18/14","name":"https://www.openwall.com/lists/oss-security/2023/04/18/14","refsource":"MISC","tags":[],"title":"oss-security - Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm\n and other modules","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/05/03/3","name":"[oss-security] 20230503 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","refsource":"MLIST","tags":[],"title":"oss-security - Re: Perl's HTTP::Tiny has insecure TLS cert default,\n affecting CPAN.pm and other modules","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/04/29/1","name":"[oss-security] 20230429 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","refsource":"MLIST","tags":[],"title":"oss-security - Re: Perl's HTTP::Tiny has insecure TLS cert default,\n affecting CPAN.pm and other modules","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://metacpan.org/dist/CPAN/changes","name":"https://metacpan.org/dist/CPAN/changes","refsource":"MISC","tags":[],"title":"Changes - metacpan.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/","name":"FEDORA-2023-1e5af38524","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: perl-CPAN-2.36-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/andk/cpanpm/pull/175","name":"https://github.com/andk/cpanpm/pull/175","refsource":"MISC","tags":[],"title":"Add verify_SSL=>1 to HTTP::Tiny in CPAN::HTTP::Client to verify https server identity by stigtsp · Pull Request #175 · andk/cpanpm · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/","name":"FEDORA-2023-1e5af38524","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: perl-CPAN-2.36-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/","name":"FEDORA-2023-46924e402a","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: perl-CPAN-2.36-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","name":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","refsource":"MISC","tags":[],"title":"Perl's HTTP::Tiny has insecure TLS default, affecting CPAN.pm and other modules – Hackeriet Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/05/07/2","name":"[oss-security] 20230507 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","refsource":"MLIST","tags":[],"title":"oss-security - Re: Perl's HTTP::Tiny has insecure TLS cert default,\n affecting CPAN.pm and other modules","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/05/03/5","name":"[oss-security] 20230503 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","refsource":"MLIST","tags":[],"title":"oss-security - Re: Perl's HTTP::Tiny has insecure TLS cert default,\n affecting CPAN.pm and other modules","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/","name":"FEDORA-2023-46924e402a","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: perl-CPAN-2.36-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-31484","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31484","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"31484","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cpanpm_project","cpe5":"cpanpm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"31484","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"perl","cpe5":"perl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-31484","qid":"161126","title":"Oracle Enterprise Linux Security Update for perl-cpan (ELSA-2023-6539)"},{"cve":"CVE-2023-31484","qid":"199391","title":"Ubuntu Security Notification for Perl Vulnerability (USN-6112-2)"},{"cve":"CVE-2023-31484","qid":"199482","title":"Ubuntu Security Notification for Perl Vulnerability (USN-6112-1)"},{"cve":"CVE-2023-31484","qid":"242292","title":"Red Hat Update for perl-cpan (RHSA-2023:6539)"},{"cve":"CVE-2023-31484","qid":"284306","title":"Fedora Security Update for perl (FEDORA-2023-46924e402a)"},{"cve":"CVE-2023-31484","qid":"284307","title":"Fedora Security Update for perl (FEDORA-2023-1e5af38524)"},{"cve":"CVE-2023-31484","qid":"330151","title":"IBM AIX Vulnerability in perl (perl_advisory7)"},{"cve":"CVE-2023-31484","qid":"355086","title":"Amazon Linux Security Advisory for perl : ALAS2-2023-2034"},{"cve":"CVE-2023-31484","qid":"355279","title":"Amazon Linux Security Advisory for perl : ALAS2023-2023-178"},{"cve":"CVE-2023-31484","qid":"355344","title":"Amazon Linux Security Advisory for perl : ALAS-2023-1751"},{"cve":"CVE-2023-31484","qid":"355401","title":"Amazon Linux Security Advisory for perl-CPAN : ALAS2023-2023-182"},{"cve":"CVE-2023-31484","qid":"673218","title":"EulerOS Security Update for perl (EulerOS-SA-2023-2390)"},{"cve":"CVE-2023-31484","qid":"673253","title":"EulerOS Security Update for perl (EulerOS-SA-2023-2364)"},{"cve":"CVE-2023-31484","qid":"673418","title":"EulerOS Security Update for perl (EulerOS-SA-2023-2661)"},{"cve":"CVE-2023-31484","qid":"673436","title":"EulerOS Security Update for perl-cpan (EulerOS-SA-2023-3143)"},{"cve":"CVE-2023-31484","qid":"673493","title":"EulerOS Security Update for perl (EulerOS-SA-2023-2703)"},{"cve":"CVE-2023-31484","qid":"673652","title":"EulerOS Security Update for perl (EulerOS-SA-2023-3142)"},{"cve":"CVE-2023-31484","qid":"673931","title":"EulerOS Security Update for perl (EulerOS-SA-2023-2904)"},{"cve":"CVE-2023-31484","qid":"674030","title":"EulerOS Security Update for perl (EulerOS-SA-2023-2885)"},{"cve":"CVE-2023-31484","qid":"755881","title":"SUSE Enterprise Linux Security Update for perl (SUSE-SU-2023:2882-1)"},{"cve":"CVE-2023-31484","qid":"908066","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for perl (37126)"},{"cve":"CVE-2023-31484","qid":"941351","title":"AlmaLinux Security Update for perl-CPAN (ALSA-2023:6539)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-31484","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","refsource":"MISC","name":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/"},{"url":"https://www.openwall.com/lists/oss-security/2023/04/18/14","refsource":"MISC","name":"https://www.openwall.com/lists/oss-security/2023/04/18/14"},{"url":"https://github.com/andk/cpanpm/pull/175","refsource":"MISC","name":"https://github.com/andk/cpanpm/pull/175"},{"url":"https://metacpan.org/dist/CPAN/changes","refsource":"MISC","name":"https://metacpan.org/dist/CPAN/changes"},{"refsource":"MLIST","name":"[oss-security] 20230429 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","url":"http://www.openwall.com/lists/oss-security/2023/04/29/1"},{"refsource":"MLIST","name":"[oss-security] 20230503 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","url":"http://www.openwall.com/lists/oss-security/2023/05/03/3"},{"refsource":"MLIST","name":"[oss-security] 20230503 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","url":"http://www.openwall.com/lists/oss-security/2023/05/03/5"},{"refsource":"MLIST","name":"[oss-security] 20230507 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules","url":"http://www.openwall.com/lists/oss-security/2023/05/07/2"},{"refsource":"FEDORA","name":"FEDORA-2023-1e5af38524","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/"},{"refsource":"FEDORA","name":"FEDORA-2023-46924e402a","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/"}]}},"nvd":{"publishedDate":"2023-04-29 00:15:00","lastModifiedDate":"2023-11-07 04:14:00","problem_types":["CWE-295"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cpanpm_project:cpanpm:*:*:*:*:*:*:*:*","versionEndExcluding":"2.35","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","versionEndExcluding":"5.38.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}