Home » Database

AVID-2026-R1115

Description

Vulnerabilities with blob verification in sigstore cosign (CVE-2022-36056)

Details

Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.

Reason for inclusion in AVID: CVE-2022-36056 describes multiple flaws in cosign’s blob verification (sigstore) that can cause invalid artifacts to pass verification, enabling potential tampering in artifact signing/verification workflows. Cosign is a software supply-chain tool used to sign and verify artifacts (e.g., container images, model artifacts) in AI system build/deploy pipelines. This is a software/CI-CD/tooling vulnerability with direct impact on AI pipelines, hence relevant to the general-purpose AI supply chain. Evidence included: advisory mentions version fix and CVE/CWE-347.

References

Affected or Relevant Artifacts

  • Developer: sigstore
  • Deployer: sigstore
  • Artifact Details:
TypeName
Systemcosign

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Base Score5.5
Base Severity🟠 Medium
Attack VectorLOCAL
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity Impact🔴 High
Availability ImpactNONE

CWE

IDDescription
CWE-347CWE-347: Improper Verification of Cryptographic Signature

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-09-14
  • Version: 0.3.3
  • AVID Entry