CVE-2025-24976

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24976
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24976.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-24976
Aliases
Related
Published
2025-02-11T16:15:52Z
Modified
2025-03-03T19:41:55.757189Z
Summary
[none]
Details

Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (kid) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication.

References

Affected packages

Git / github.com/distribution/distribution

Affected ranges

Type
GIT
Repo
https://github.com/distribution/distribution
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

docs-v2.*

docs-v2.4.1-2016-06-28

v2.*

v2.0.0
v2.0.0-alpha.0
v2.0.0-alpha.1
v2.0.0-alpha.2
v2.0.0-alpha.3
v2.0.0-rc.0
v2.0.0-rc.1
v2.0.0-rc.2
v2.0.0-rc.3
v2.0.0-rc.4
v2.1.0
v2.1.0-rc.0
v2.1.1
v2.2.0
v2.2.1
v2.3.0-alpha
v2.3.0-rc.0
v2.3.0-rc.1
v2.3.0-rc.2
v2.4.0-rc.1
v2.5.0-rc.1
v2.6.0-rc.1
v2.7.0
v2.7.0-rc.0

v3.*

v3.0.0-alpha.1
v3.0.0-beta.1
v3.0.0-rc.1
v3.0.0-rc.2