Exposure of Sensitive System Information to an Unauthorized Control Sphere Affecting github.com/ratify-project/ratify/cmd/ratify/cmd package, versions <1.2.3>=1.3.0 <1.3.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMRATIFYPROJECTRATIFYCMDRATIFYCMD-9486472
  • published20 Mar 2025
  • disclosed11 Mar 2025
  • creditShiwei Zhang, Binbin Li

Introduced: 11 Mar 2025

NewCVE-2025-27403  (opens in a new tab)
CWE-497  (opens in a new tab)

How to fix?

Upgrade github.com/ratify-project/ratify/cmd/ratify/cmd to version 1.2.3, 1.3.2 or higher.

Overview

Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere due to the improper validation of target registry domains during the token exchange process. An attacker can extract and misuse authentication tokens by directing requests to a malicious registry.

Note:

This is only exploitable if a private Azure Container Registry is configured to be used with the Azure authentication providers.

Workaround

This vulnerability can be mitigated by ensuring that only well-known Azure Container Registry endpoints are configured and used for authentication.

References

CVSS Base Scores

version 4.0
version 3.1