CVE-2023-32076: in-toto vulnerable to Configuration Read From Local Directory
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.12424%
CWE
Published
5/11/2023
Updated
11/11/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| in-toto | pip | <= 1.4.0 | 2.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from parsing untrusted .in_totorc files via the user_settings module. The commit 3a21d84 completely removed this module, deleting set_settings() and get_rc(). These functions implemented the dangerous configuration loading mechanism by:
- Reading from XDG-specified paths including CWD (get_rc)
- Overriding security settings with untrusted values (set_settings) The patch removed all calls to set_settings() from CLI entry points (in_toto_run.py, in_toto_record.py), confirming these were the vulnerable functions.