CVE-2021-41087
low-risk
Published 2021-09-21
in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0.
Do I need to act?
-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.6/10
Medium
LOCAL
/ HIGH complexity
Affected Products (1)
In-Toto-Golang
Affected Vendors
References (4)
Third Party Advisory
https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf...
Third Party Advisory
https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf...
21
/ 100
low-risk
Severity
15/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal