Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).
The problem has been fixed in version 0.3.0.
Exploiting this vulnerability is dependent on the specific policy applied.
If you have any questions or comments about this advisory: * Open an issue in in-toto-golang * Email us at in-toto-public * If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
{
"severity": "MODERATE",
"github_reviewed_at": "2021-09-21T21:51:18Z",
"cwe_ids": [
"CWE-22",
"CWE-345"
],
"github_reviewed": true,
"nvd_published_at": "2021-09-21T21:15:00Z"
}