Skip to content

Commit 9c10339

Browse files
1 parent f751d1e commit 9c10339

1 file changed

Lines changed: 65 additions & 0 deletions

File tree

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hm8f-75xx-w2vr",
4+
"modified": "2026-01-26T21:34:50Z",
5+
"published": "2026-01-26T21:34:50Z",
6+
"aliases": [
7+
"CVE-2026-24408"
8+
],
9+
"summary": "sigstore CSRF possibility in OIDC authentication during signing",
10+
"details": "### Summary\n\nThe sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery.\n\n### Details\n\n`_OAuthSession` creates a unique \"state\" and sends it as a parameter in the authentication request but the \"state\" in the server response seems not not be cross-checked with this value. \n\nFix should be fairly trivial.\n\n### Impact\n\nThis should be low impact: A man-in-the middle attacker could trick a sigstore-python user into signing something with an identity controlled by the attacker (by returning the response to an authentication request they created). This would be quite confusing but not dangerous.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "sigstore"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "4.2.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/sigstore/sigstore-python/security/advisories/GHSA-hm8f-75xx-w2vr"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/sigstore/sigstore-python/commit/5e77497fe8f0b202bdd118949074ec2f20da69aa"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/sigstore/sigstore-python"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/sigstore/sigstore-python/releases/tag/v4.2.0"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-352"
59+
],
60+
"severity": "LOW",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-01-26T21:34:50Z",
63+
"nvd_published_at": null
64+
}
65+
}

0 commit comments

Comments
 (0)