CVE-2021-41087 (Medium) detected in github.com/in-toto/in-toto-golang-v0.2.1-0.20210627200632-886210ae2ab9 #130
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-41087 - Medium Severity Vulnerability
Vulnerable Library - github.com/in-toto/in-toto-golang-v0.2.1-0.20210627200632-886210ae2ab9
A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.
Library home page: https://proxy.golang.org/github.com/in-toto/in-toto-golang/@v/v0.2.1-0.20210627200632-886210ae2ab9.zip
Path to dependency file: /go.mod
Path to vulnerable library: /go.mod
Dependency Hierarchy:
Found in HEAD commit: df1f7d3f67826e841793324e4796be4fbd91c00f
Found in base branch: main
Vulnerability Details
in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0.
Publish Date: 2021-09-21
URL: CVE-2021-41087
CVSS 3 Score Details (5.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-vrxp-mg9f-hwf3
Release Date: 2021-09-21
Fix Resolution: v0.3.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: