Skip to content

Rekor public keys fetched from upstream API instead of local TUF client.

Moderate
wlynch published GHSA-xvrc-2wvh-49vc Nov 10, 2023

Package

gomod github.com/sigstore/gitsign (Go)

Affected versions

>=0.6.0

Patched versions

v0.8.0

Description

Impact

In certain versions of gitsign, Rekor public keys were fetched via the Rekor API, instead of through the local TUF client. If the upstream Rekor server happened to be compromised, gitsign clients could potentially be tricked into trusting incorrect signatures.

There is no known compromise the default public good instance (rekor.sigstore.dev) - anyone using this instance is unlikely to be affected.

Patches

This was fixed in v0.8.0 via #399

Workarounds

n/a

References

Are there any links users can visit to find out more?

https://docs.sigstore.dev/about/threat-model/#sigstore-threat-model

Severity

Moderate
4.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N

CVE ID

CVE-2023-47122

Weaknesses

No CWEs

Credits