Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-46737

Опубликовано: 07 нояб. 2023
Источник: nvd
CVSS3: 3.1
CVSS3: 5.3
EPSS Низкий

Описание

Cosign is a sigstore signing tool for OCI containers. Cosign is susceptible to a denial of service by an attacker controlled registry. An attacker who controls a remote registry can return a high number of attestations and/or signatures to Cosign and cause Cosign to enter a long loop resulting in an endless data attack. The root cause is that Cosign loops through all attestations fetched from the remote registry in pkg/cosign.FetchAttestations. The attacker needs to compromise the registry or make a request to a registry they control. When doing so, the attacker must return a high number of attestations in the response to Cosign. The result will be that the attacker can cause Cosign to go into a long or infinite loop that will prevent other users from verifying their data. In Kyvernos case, an attacker whose privileges are limited to making requests to the cluster can make a request with an image reference to their own registry, trigger the infinite loop and deny other users from compl

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*
Версия до 2.2.1 (исключая)

EPSS

Процентиль: 54%
0.0031
Низкий

3.1 Low

CVSS3

5.3 Medium

CVSS3

Дефекты

CWE-400
CWE-835

Связанные уязвимости

CVSS3: 5.3
redhat
больше 2 лет назад

Cosign is a sigstore signing tool for OCI containers. Cosign is susceptible to a denial of service by an attacker controlled registry. An attacker who controls a remote registry can return a high number of attestations and/or signatures to Cosign and cause Cosign to enter a long loop resulting in an endless data attack. The root cause is that Cosign loops through all attestations fetched from the remote registry in pkg/cosign.FetchAttestations. The attacker needs to compromise the registry or make a request to a registry they control. When doing so, the attacker must return a high number of attestations in the response to Cosign. The result will be that the attacker can cause Cosign to go into a long or infinite loop that will prevent other users from verifying their data. In Kyvernos case, an attacker whose privileges are limited to making requests to the cluster can make a request with an image reference to their own registry, trigger the infinite loop and deny other users from co...

CVSS3: 3.1
debian
больше 2 лет назад

Cosign is a sigstore signing tool for OCI containers. Cosign is suscep ...

suse-cvrf
около 2 лет назад

Security update for cosign

CVSS3: 3.1
github
около 2 лет назад

Cosign vulnerable to possible endless data attack from attacker-controlled registry

EPSS

Процентиль: 54%
0.0031
Низкий

3.1 Low

CVSS3

5.3 Medium

CVSS3

Дефекты

CWE-400
CWE-835