Miggo Logo

CVE-2025-27403:
Ratify Azure authentication providers can leak authentication tokens to non-Azure container registries

N/A

CVSS Score

Basic Information

EPSS Score
0.31517%
Published
3/11/2025
Updated
3/14/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/ratify-project/ratifygo< 1.2.31.2.3
github.com/ratify-project/ratifygo>= 1.3.0, < 1.3.21.3.2
github.com/deislabs/ratifygo< 1.2.31.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing registry domain validation in Azure authentication providers. The commit diff shows these two functions were modified to add host validation logic (validateHost) in the Provide methods. Prior to the patch, these functions handled token exchange without checking if the target registry was an authorized Azure Container Registry, making them the entry points for the credential leakage vulnerability. The high confidence comes from direct correlation between the vulnerability description, patch commit changes, and CWE-287/497 mappings.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t In * Ku**rn*t*s *nvironm*nt, R*ti*y **n ** *on*i*ur** to *ut**nti**t* to * priv*t* *zur* *ont*in*r R**istry (**R). T** *zur* worklo** i**ntity *n* *zur* m*n**** i**ntity *ut**nti**tion provi**rs *r* *on*i*ur** in t*is s*tup. Us*rs t**t *o

Reasoning

T** vuln*r**ility st*ms *rom missin* r**istry *om*in v*li**tion in *zur* *ut**nti**tion provi**rs. T** *ommit *i** s*ows t**s* two *un*tions w*r* mo*i*i** to *** *ost v*li**tion lo*i* (`v*li**t**ost`) in t** Provi** m*t*o*s. Prior to t** p*t**, t**s*