Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8gw7-4j42-w388 Cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-22T17:21:40.980Z

Reserved: 2022-07-15T00:00:00.000Z

Link: CVE-2022-36056

cve-icon Vulnrichment

Updated: 2024-08-03T09:52:00.499Z

cve-icon NVD

Status : Modified

Published: 2022-09-14T20:15:09.860

Modified: 2024-11-21T07:12:16.937

Link: CVE-2022-36056

cve-icon Redhat

Severity : Low

Publid Date: 2022-09-14T00:00:00Z

Links: CVE-2022-36056 - Bugzilla

cve-icon OpenCVE Enrichment

No data.