Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).
The problem has been fixed in version 0.3.0.
Exploiting this vulnerability is dependent on the specific policy applied.
If you have any questions or comments about this advisory: * Open an issue in in-toto-golang * Email us at in-toto-public * If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
{ "nvd_published_at": "2021-09-21T21:15:00Z", "github_reviewed_at": "2021-09-21T21:51:18Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-22", "CWE-345" ] }