AVID-2026-R0886
Description
Improperly Implemented path matching for in-toto-golang (CVE-2021-41087)
Details
in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0.
Reason for inclusion in AVID: CVE-2021-41087 describes a vulnerability in in-toto-golang, a software supply chain attestation framework. The flaw allows authenticated attackers with trusted keys to craft attestations containing disallowed artifacts via path traversal, bypassing policy checks. This directly concerns software supply chain tooling and integrity checks, which are components used to build, package, deploy, and run general-purpose AI systems (CI/CD, artifact verification, dependency/artifact ecosystems). Although the flaw is not AI-specific, it impacts the reliability of AI pipelines that rely on secure software supply chains. The report provides explicit vulnerability details, affected versions, impact, and references, supporting its relevance for AVID curation in AI software stacks.
References
- NVD entry
- https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3
- https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290
Affected or Relevant Artifacts
- Developer: in-toto
- Deployer: in-toto
- Artifact Details:
| Type | Name |
|---|---|
| System | in-toto-golang |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N |
| Base Score | 5.6 |
| Base Severity | 🟠 Medium |
| Attack Vector | LOCAL |
| Attack Complexity | 🔴 High |
| Privileges Required | 🟢 Low |
| User Interaction | NONE |
| Scope | CHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | 🔴 High |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-345 | CWE-345: Insufficient Verification of Data Authenticity |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2021-09-21
- Version: 0.3.3
- AVID Entry