Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
sigstore-java has a vulnerability with bundle verification
Vulnerability Description
sigstore-java is a sigstore java client for interacting with sigstore infrastructure. sigstore-java has insufficient verification for a situation where a bundle provides a invalid signature for a checkpoint. This bug impacts clients using any variation of KeylessVerifier.verify(). Currently checkpoints are only used to ensure the root hash of an inclusion proof was provided by the log in question. Failing to validate that means a bundle may provide an inclusion proof that doesn't actually correspond to the log in question. This may eventually lead a monitor/witness being unable to detect when a compromised logs are providing different views of themselves to different clients. There are other mechanisms right now that mitigate this, such as the signed entry timestamp. Sigstore-java currently requires a valid signed entry timestamp. By correctly verifying the signed entry timestamp we can make certain assertions about the log signing the log entry (like the log was aware of the artifact signing event and signed it). Therefore the impact on clients that are not monitors/witnesses is very low. This vulnerability is fixed in 1.2.0.
CVSS Information
N/A
Vulnerability Type
输入验证不恰当
Vulnerability Title
sigstore-java 输入验证错误漏洞
Vulnerability Description
sigstore-java是sigstore开源的一个用于与 sigstore 基础架构交互的 sigstore java 客户端。 sigstore-java 1.2.0之前版本存在输入验证错误漏洞,该漏洞源于在用户提供无效签名的情况下无法进行充分验证。
CVSS Information
N/A
Vulnerability Type
N/A