Skip to content

Improperly Implemented path matching for in-toto-golang

Moderate
adityasaky published GHSA-vrxp-mg9f-hwf3 Sep 21, 2021

Package

gomod in_toto (Go)

Affected versions

<=0.2.0

Patched versions

0.3.0

Description

Impact

Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).

Patches

The problem has been fixed in version 0.3.0.

Workarounds

Exploiting this vulnerability is dependent on the specific policy applied.

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2021-41087

Weaknesses

Credits