Skip to content

x/vulndb: potential Go vuln in github.com/sigstore/cosign: CVE-2022-36056 #998

New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Closed
GoVulnBot opened this issue Sep 14, 2022 · 3 comments
Assignees

Comments

@GoVulnBot
Copy link

CVE-2022-36056 references github.com/sigstore/cosign, which may be a Go module.

Description:
Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.

References:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/sigstore/cosign
    packages:
      - package: cosign
description: |
    Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.
cves:
  - CVE-2022-36056
references:
  - web: https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388
  - fix: https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25

@tatianab tatianab assigned rolandshoemaker and unassigned julieqiu Sep 21, 2022
@tatianab tatianab self-assigned this Sep 28, 2022
@tatianab tatianab added excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. and removed NeedsReport labels Oct 3, 2022
@tatianab
Copy link
Contributor

tatianab commented Oct 3, 2022

Vulnerability in tool

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/438179 mentions this issue: data/excluded: add GO-2022-0998.yaml for CVE-2022-36056

@zpavlinovic zpavlinovic self-assigned this Nov 9, 2023
@zpavlinovic zpavlinovic added NeedsReport and removed excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. labels Nov 9, 2023
@zpavlinovic zpavlinovic reopened this Nov 9, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/540975 mentions this issue: data/reports: add GO-2022-0998.yaml

# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

6 participants