Skip to content

Improperly Implemented path matching for in-toto-golang

Moderate
adityasaky published GHSA-vrxp-mg9f-hwf3 Sep 21, 2021

Package

gomod in_toto (Go)

Affected versions

<=0.2.0

Patched versions

0.3.0

Description

Impact

Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).

Patches

The problem has been fixed in version 0.3.0.

Workarounds

Exploiting this vulnerability is dependent on the specific policy applied.

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2021-41087

Weaknesses

Improperly Implemented Security Check for Standard

The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique. Learn more on MITRE.

Credits