Miggo Logo

CVE-2022-23649: Improper Certificate Validation in Cosign

3.3

CVSS Score
3.1

Basic Information

EPSS Score
0.16673%
Published
2/22/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/sigstore/cosigngo< 1.5.21.5.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two main issues: 1) The VerifyBundle function didn't compare the signature in the Rekor bundle with the actual signature being verified, allowing bundle swapping attacks. 2) The PrintVerificationHeader function displayed misleading success messages about transparency log verification and certificate checks even when no relevant certificates existed. The commit 96d410a added signature comparison in VerifyBundle and modified verification status reporting in PrintVerificationHeader, directly addressing these issues.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *osi*n **n ** m*nipul*t** to *l*im t**t *n *ntry *or * si*n*tur* *xists in t** R*kor tr*nsp*r*n*y lo* *v*n i* it *o*sn't. T*is r*quir*s t** *tt**k*r to **v* pull *n* pus* p*rmissions *or t** si*n*tur* in O*I. T*is **n **pp*n wit* *ot* st*

Reasoning

T** vuln*r**ility st*ms *rom two m*in issu*s: *) T** `V*ri*y*un*l*` *un*tion *i*n't *omp*r* t** si*n*tur* in t** `R*kor` *un*l* wit* t** **tu*l si*n*tur* **in* v*ri*i**, *llowin* *un*l* sw*ppin* *tt**ks. *) T** `PrintV*ri*i**tion*****r` *un*tion *isp