Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xvrc-2wvh-49vc

Опубликовано: 14 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.2

Описание

Gitsign's Rekor public keys fetched from upstream API instead of local TUF client.

Impact

In certain versions of gitsign, Rekor public keys were fetched via the Rekor API, instead of through the local TUF client. If the upstream Rekor server happened to be compromised, gitsign clients could potentially be tricked into trusting incorrect signatures.

There is no known compromise the default public good instance (rekor.sigstore.dev) - anyone using this instance is unlikely to be affected.

Patches

This was fixed in v0.8.0 via https://github.com/sigstore/gitsign/pull/399

Workarounds

n/a

References

Are there any links users can visit to find out more?

https://docs.sigstore.dev/about/threat-model/#sigstore-threat-model

Пакеты

Наименование

github.com/sigstore/gitsign

go
Затронутые версииВерсия исправления

>= 0.6.0, < 0.8.0

0.8.0

EPSS

Процентиль: 27%
0.00091
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 4.2
nvd
почти 2 года назад

Gitsign is software for keyless Git signing using Sigstore. In versions of gitsign starting with 0.6.0 and prior to 0.8.0, Rekor public keys were fetched via the Rekor API, instead of through the local TUF client. If the upstream Rekor server happened to be compromised, gitsign clients could potentially be tricked into trusting incorrect signatures. There is no known compromise the default public good instance (`rekor.sigstore.dev`) - anyone using this instance is unaffected. This issue was fixed in v0.8.0. No known workarounds are available.

CVSS3: 4.2
debian
почти 2 года назад

Gitsign is software for keyless Git signing using Sigstore. In version ...

EPSS

Процентиль: 27%
0.00091
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-347