Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qg8-fj49-pxjh

Опубликовано: 05 дек. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Sigstore Timestamp Authority allocates excessive memory during request parsing

Impact

Excessive memory allocation

Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string.

As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Patches

Upgrade to v2.0.3.

Workarounds

There are no workarounds with the service itself. If the service is behind a load balancer, configure the load balancer to reject excessively large requests.

Пакеты

Наименование

github.com/sigstore/timestamp-authority

go
Затронутые версииВерсия исправления

<= 2.0.2

2.0.3

EPSS

Процентиль: 4%
0.00018
Низкий

7.5 High

CVSS3

Дефекты

CWE-405

Связанные уязвимости

CVSS3: 7.5
ubuntu
2 месяца назад

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

CVSS3: 7.5
nvd
2 месяца назад

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

CVSS3: 7.5
debian
2 месяца назад

Sigstore Timestamp Authority is a service for issuing RFC 3161 timesta ...

EPSS

Процентиль: 4%
0.00018
Низкий

7.5 High

CVSS3

Дефекты

CWE-405