Learn about CVE-2021-41087 impacting in-toto-golang versions prior to 0.3.0. The vulnerability allows attackers to bypass security rules and compromise software supply chain integrity. Get mitigation steps here.
in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions, authenticated attackers posing as functionaries can create attestations that may bypass DISALLOW rules in the same layout, potentially compromising security. This vulnerability has a CVSS base score of 5.6 (Medium).
Understanding CVE-2021-41087
in-toto-golang vulnerability impacting versions prior to 0.3.0
What is CVE-2021-41087?
in-toto-golang allows authenticated attackers to bypass DISALLOW rules and create attestations compromising the security integrity of the software supply chain.
The Impact of CVE-2021-41087
Technical Details of CVE-2021-41087
Vulnerability in in-toto-golang
Vulnerability Description
The vulnerability allows attackers to include disallowed artifacts in attestations by exploiting path traversal semantics, potentially compromising software supply chain integrity.
Affected Systems and Versions
Exploitation Mechanism
Attackers can pose as functionaries within a trusted set of users to issue attestations containing disallowed artifacts, bypassing security rules within the layout.
Mitigation and Prevention
Protecting against CVE-2021-41087
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates