Impact
Quill, a tool for signing and notarizing macOS binaries, contains an SSRF vulnerability in versions prior to v0.7.1. When retrieving Apple notarization submission logs, Quill downloads a URL supplied in Apple's API response without validating that it uses https or that the host is a public domain. Exploitation requires an attacker to modify that API response, which is infeasible under normal HTTPS conditions but possible when TLS‑intercepting proxies, compromised certificate authorities, or other trust violations exist. An attacker who succeeds can cause Quill to issue requests to internal or attacker‑controlled servers, potentially exfiltrating sensitive data such as cloud credentials or internal service responses.
Affected Systems
The affected product is Quill from anchore. All releases before version 0.7.1 (including v0.6 and earlier) are vulnerable. Both the Quill CLI and its library API can be used to trigger the flaw.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. The EPSS score is less than 1%, suggesting a low probability of widespread exploitation, and the flaw is not listed in CISA’s KEV catalog. Exploitation requires the attacker to tamper with the Apple notarization service response, a capability that typically demands a compromised CA, TLS‑intercepting proxy, or similar network trust violation. Thus the attack vector is limited, but environments with such network controls remain at risk.
OpenCVE Enrichment
Github GHSA