Miggo Logo

CVE-2023-33958: Notation's default `maxSignatureAttempts` in `notation verify` enables an endless data attack

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.21292%
Published
6/6/2023
Updated
11/5/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/notaryproject/notationgo< 1.0.0-rc.61.0.0-rc.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from uncontrolled resource consumption (CWE-400) during signature verification. The advisory indicates the default maxSignatureAttempts parameter allowed endless processing of signatures from a compromised registry. The fix in v1.0.0-rc.6 likely introduced a limit check in the signature verification loop. The verifySignatures function (or equivalent) in the verification workflow would be responsible for iterating through signatures, and without a proper maxSignatureAttempts enforcement, it would cause resource exhaustion. This aligns with the vulnerability's impact description and the CWE classification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n *tt**k*r w*o *ontrols or *ompromis*s * r**istry **n m*k* t** r**istry s*rv* *n in*init* num**r o* si*n*tur*s *or t** *rti***t, **usin* * **ni*l o* s*rvi** to t** *ost m***in* runnin* `not*tion v*ri*y`. ### P*t***s T** pro*l*m **s ***n

Reasoning

T** vuln*r**ility st*ms *rom un*ontroll** r*sour** *onsumption (*W*-***) *urin* si*n*tur* v*ri*i**tion. T** **visory in*i**t*s t** ****ult `m*xSi*n*tur**tt*mpts` p*r*m*t*r *llow** *n*l*ss pro**ssin* o* si*n*tur*s *rom * *ompromis** r**istry. T** *ix