GHSA-739f-hw6h-7wq8

Suggest an improvement
Source
https://github.com/advisories/GHSA-739f-hw6h-7wq8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-739f-hw6h-7wq8/GHSA-739f-hw6h-7wq8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-739f-hw6h-7wq8
Aliases
Related
Published
2022-08-10T18:38:16Z
Modified
2024-08-21T15:58:32.699834Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
PolicyController before 0.2.1 may bypass attestation verification
Details

PolicyController will report a false positive, resulting in an admission when it should not be admitted when: * There is at least one attestation with a valid signature * There are NO attestations of the type being verified (--type defaults to "custom")

Users should upgrade to cosign version 0.2.1 or greater for a patch. There are no known workarounds at this time.

Database specific
{
    "nvd_published_at": "2022-08-04T22:15:00Z",
    "github_reviewed_at": "2022-08-10T18:38:16Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-347"
    ]
}
References

Affected packages

Go / github.com/sigstore/policy-controller

Package

Name
github.com/sigstore/policy-controller
View open source insights on deps.dev
Purl
pkg:golang/github.com/sigstore/policy-controller

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.1