CVE-2022-36056

MEDIUM

Cosign <1.12.0 - Info Disclosure

Title source: llm
STIX 2.1

Description

Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.

References (2)

Core 2
Core References
Exploit, Mitigation, Patch, Third Party Advisory x_refsource_confirm
https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388

Scores

CVSS v3 5.5
EPSS 0.0006
EPSS Percentile 19.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-347
Status published
Products (2)
sigstore/cosign < 1.12.0
sigstore/cosign 0 - 1.12.0Go
Published Sep 14, 2022
Tracked Since Feb 18, 2026