Learn about CVE-2023-47122, a vulnerability in Gitsign impacting versions 0.6.0 to less than 0.8.0. Understand the impact, affected systems, exploitation mechanism, and mitigation steps.
This article provides detailed information about CVE-2023-47122, a vulnerability in Gitsign's Rekor public keys fetching mechanism.
Understanding CVE-2023-47122
CVE-2023-47122 involves the improper verification of cryptographic signatures in Gitsign, affecting versions starting from 0.6.0 to less than 0.8.0. The vulnerability arises from fetching Rekor public keys from the Rekor API instead of the local TUF client.
What is CVE-2023-47122?
Gitsign, a software for keyless Git signing using Sigstore, had a vulnerability where Rekor public keys were fetched from the Rekor API instead of the local TUF client. This could lead to incorrect signatures being trusted if the Rekor server was compromised.
The Impact of CVE-2023-47122
The impact of this vulnerability is moderate, with a CVSS v3.1 base score of 4.2 (Medium severity). It required high privileges and user interaction for exploitation.
Technical Details of CVE-2023-47122
In this section, we will dive deeper into the vulnerability, affected systems, and the exploitation mechanism.
Vulnerability Description
The vulnerability in Gitsign allowed attackers to potentially trick clients into trusting incorrect signatures by fetching Rekor public keys from the Rekor API.
Affected Systems and Versions
Gitsign versions >= 0.6.0 and < 0.8.0 were affected by this vulnerability, impacting users who fetched public keys through the Rekor API.
Exploitation Mechanism
Attackers could exploit this vulnerability by compromising the upstream Rekor server, leading to incorrect signatures being trusted by gitsign clients.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-47122, users should take immediate steps and adopt long-term security practices, including applying necessary patches and updates.
Immediate Steps to Take
Users are advised to update to version 0.8.0 of Gitsign, where the issue has been resolved. It is crucial to avoid fetching Rekor public keys from compromised sources.
Long-Term Security Practices
In the long term, it is recommended to follow secure coding practices, validate cryptographic signatures properly, and regularly update software to prevent such vulnerabilities.
Patching and Updates
Ensure that Gitsign is updated to version 0.8.0 or newer to protect against CVE-2023-47122 and other potential security threats.