Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4c4x-jm2x-pf9j

Опубликовано: 22 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Rekor affected by Server-Side Request Forgery (SSRF) via provided public key URL

Summary

/api/v1/index/retrieve supports retrieving a public key via a user-provided URL, allowing attackers to trigger SSRF to arbitrary internal services.

Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF.

Impact

  • SSRF to cloud metadata (169.254.169.254)
  • SSRF to internal Kubernetes APIs
  • SSRF to any service accessible from Fulcio's network

Patches

Upgrade to v1.5.0. Note that this is a breaking change to the search API and fully disables lookups by URL. If you require this feature, please reach out and we can discuss alternatives.

Workarounds

Disable the search endpoint with --enable_retrieve_api=false.

Пакеты

Наименование

github.com/sigstore/rekor

go
Затронутые версииВерсия исправления

<= 1.4.3

1.5.0

EPSS

Процентиль: 11%
0.00039
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 5.3
ubuntu
15 дней назад

Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.

CVSS3: 5.3
nvd
15 дней назад

Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.

CVSS3: 5.3
debian
15 дней назад

Rekor is a software supply chain transparency log. In versions 1.4.3 a ...

EPSS

Процентиль: 11%
0.00039
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-918