Home » Database

AVID-2026-R0886

Description

Improperly Implemented path matching for in-toto-golang (CVE-2021-41087)

Details

in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0.

Reason for inclusion in AVID: CVE-2021-41087 describes a vulnerability in in-toto-golang, a software supply chain attestation framework. The flaw allows authenticated attackers with trusted keys to craft attestations containing disallowed artifacts via path traversal, bypassing policy checks. This directly concerns software supply chain tooling and integrity checks, which are components used to build, package, deploy, and run general-purpose AI systems (CI/CD, artifact verification, dependency/artifact ecosystems). Although the flaw is not AI-specific, it impacts the reliability of AI pipelines that rely on secure software supply chains. The report provides explicit vulnerability details, affected versions, impact, and references, supporting its relevance for AVID curation in AI software stacks.

References

Affected or Relevant Artifacts

  • Developer: in-toto
  • Deployer: in-toto
  • Artifact Details:
TypeName
Systemin-toto-golang

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
Base Score5.6
Base Severity🟠 Medium
Attack VectorLOCAL
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionNONE
ScopeCHANGED
Confidentiality ImpactNONE
Integrity Impact🔴 High
Availability ImpactNONE

CWE

IDDescription
CWE-345CWE-345: Insufficient Verification of Data Authenticity

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-09-21
  • Version: 0.3.3
  • AVID Entry