The vulnerability is a Server-Side Request Forgery (SSRF) located in Rekor's /api/v1/index/retrieve API endpoint. The root cause was that the server would fetch a public key from a user-provided URL, without proper validation of the URL's destination.
The analysis of the patch commit 60ef2bceba192c5bf9327d003bceea8bf1f8275f reveals the exact location of the vulnerability. The function api.SearchIndexHandler in pkg/api/index.go was responsible for handling the API request. It previously used a utility function, util.FileOrURLReadCloser, to retrieve the public key. This utility would make an HTTP GET request if a URL was provided in the request parameters (params.Query.PublicKey.URL).
The patch remediates this vulnerability by removing the capability to fetch keys by URL entirely from the server-side logic. The api.SearchIndexHandler was modified to only process public keys provided directly in the request content (params.Query.PublicKey.Content). The URL field was also removed from the API definition (openapi.yaml) and related data structures.
Consequently, two functions are identified as key runtime indicators for this vulnerability:
api.SearchIndexHandler: The entry point for the vulnerable operation, which takes the user-supplied URL.
util.FileOrURLReadCloser: The function that executes the outbound HTTP request, which constitutes the SSRF. Both would be present in a stack trace during exploitation.