Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Sigstore Timestamp Authority allocates excessive memory during request parsing
Vulnerability Description
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
不对称的资源消耗(放大攻击)
Vulnerability Title
Sigstore Timestamp Authority 安全漏洞
Vulnerability Description
Sigstore Timestamp Authority是sigstore开源的一个RFC3161时间戳授权软件。 Sigstore Timestamp Authority 2.0.3之前版本存在安全漏洞,该漏洞源于api.ParseJSONRequest和api.getContentType函数对非信任数据处理不当,可能导致内存过度分配。
CVSS Information
N/A
Vulnerability Type
N/A