Miggo Logo

CVE-2022-36103: Talos worker join token can be used to get elevated access level to the Talos API

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.50416%
Published
9/16/2022
Updated
7/21/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/talos-systems/talosgo< 1.2.21.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper CSR validation in trustd's certificate issuance flow. The pre-patch version of Registrator.Certificate in reg.go lacked: 1) Enforcement of server-auth-only key usage 2) Sanitization of organization fields in CSR subjects 3) Strict validation of certificate purposes. This allowed malicious CSRs to obtain client certificates with elevated privileges. The fix adds x509.Options constraints (KeyUsageDigitalSignature/ExtKeyUsageServerAuth), removes organization fields from CSRs, and adds proper error handling - all visible in the commit diff. The function's role in processing authentication-sensitive CSRs and the direct security-related changes in the patch confirm its vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*los work*r no**s us* * join tok*n to **t ****pt** into t** T*los *lust*r. * mis*on*i*ur** Ku**rn*t*s *nvironm*nt m*y *llow worklo**s to ****ss t** join tok*n o* t** work*r no**. * m*li*ious worklo** *oul* t**n us* t** join tok*n to *ons

Reasoning

T** vuln*r**ility st*mm** *rom improp*r *SR v*li**tion in trust*'s **rti*i**t* issu*n** *low. T** pr*-p*t** v*rsion o* R**istr*tor.**rti*i**t* in r**.*o l**k**: *) *n*or**m*nt o* s*rv*r-*ut*-only k*y us*** *) S*nitiz*tion o* or**niz*tion *i*l*s in *S