Miggo Logo

CVE-2023-32076: in-toto vulnerable to Configuration Read From Local Directory

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.12424%
Published
5/11/2023
Updated
11/11/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
in-totopip<= 1.4.02.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from parsing untrusted .in_totorc files via the user_settings module. The commit 3a21d84 completely removed this module, deleting set_settings() and get_rc(). These functions implemented the dangerous configuration loading mechanism by:

  1. Reading from XDG-specified paths including CWD (get_rc)
  2. Overriding security settings with untrusted values (set_settings) The patch removed all calls to set_settings() from CLI entry points (in_toto_run.py, in_toto_record.py), confirming these were the vulnerable functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** in-toto *on*i*ur*tion is r*** *rom v*rious *ir**tori*s *n* *llows us*rs to *on*i*ur* t** ****vior o* t** *r*m*work. T** *il*s *r* *rom *ir**tori*s *ollowin* t** X** **s* *ir**tory sp**i*i**tion [*]. *mon* t** *il*s r*** is `.in_totor*

Reasoning

T** vuln*r**ility st*mm** *rom p*rsin* untrust** .in_totor* *il*s vi* t** us*r_s*ttin*s mo*ul*. T** *ommit ******* *ompl*t*ly r*mov** t*is mo*ul*, **l*tin* s*t_s*ttin*s() *n* **t_r*(). T**s* *un*tions impl*m*nt** t** **n**rous *on*i*ur*tion lo**in* m