Miggo Logo

CVE-2022-29173: Improper Validation of Integrity Check Value in go-tuf

8

CVSS Score
3.1

Basic Information

EPSS Score
0.29923%
Published
5/24/2022
Updated
2/17/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/theupdateframework/go-tufgo< 0.3.00.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from 1) not using previous metadata versions for validation and 2) premature persistence of metadata. Key issues were in decodeTimestamp/decodeSnapshot which handle version validation logic, and getLocalMeta which manages trusted state loading. The timestamp/snapshot metadata saving (SetMeta) occurred before full validation in the workflow. The util.TimestampFileMetaEqual function's strict requirements could bypass spec-mandated checks. Commit fixes show added version comparisons (e.g., snapshot.Meta['targets.json'].Version checks) and corrected validation order.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t [*o-tu*](*ttps://*it*u*.*om/t**up**t**r*m*work/*o-tu*) *o*s not *orr**tly impl*m*nt t** [*li*nt work*low](*ttps://t**up**t**r*m*work.*it*u*.io/sp**i*i**tion/v*.*.**/in**x.*tml#**t*il**-*li*nt-work*low) *or up**tin* t** m*t***t* *il*s *or

Reasoning

T** vuln*r**ility st*ms *rom *) not usin* pr*vious m*t***t* v*rsions *or v*li**tion *n* *) pr*m*tur* p*rsist*n** o* m*t***t*. K*y issu*s w*r* in `***o**Tim*st*mp`/`***o**Sn*ps*ot` w*i** **n*l* v*rsion v*li**tion lo*i*, *n* `**tLo**lM*t*` w*i** m*n***