Improper Verification of Cryptographic Signature Affecting github.com/sigstore/gitsign/pkg/rekor package, versions >=0.6.0 <0.8.0
Threat Intelligence
EPSS
0.06% (28th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMSIGSTOREGITSIGNPKGREKOR-6056193
- published 13 Nov 2023
- disclosed 10 Nov 2023
- credit adityasaky
Introduced: 10 Nov 2023
CVE-2023-47122 Open this link in a new tabHow to fix?
Upgrade github.com/sigstore/gitsign/pkg/rekor
to version 0.8.0 or higher.
Overview
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature via the Rekor
API. If the upstream Rekor
server is compromised, gitsign
clients can be tricked into trusting incorrect signatures.
Note:
The default public good instance rekor.sigstore.dev
is not known to be compromised. Anyone using this instance is unlikely to be affected.
References
CVSS Scores
version 3.1