CVE-2024-53267

5.5 MEDIUM

📋 TL;DR

This vulnerability in sigstore-java allows attackers to present a validly-signed but mismatched bundle that appears to be logged in a transparency log, even though the signing event wasn't actually logged. This affects clients using KeylessVerifier.verify() to verify software artifacts, potentially allowing malicious actors to hide compromised signing events from log monitoring systems.

💻 Affected Systems

Products:
  • sigstore-java
Versions: All versions before v1.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects verification functionality using KeylessVerifier.verify(). sigstore-gradle-plugin and sigstore-maven-plugin are NOT affected as they only provide signing functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can create fake proof of logging for malicious software signatures, bypassing transparency log monitoring while still appearing properly verified to end users.

🟠

Likely Case

Sophisticated attackers could use this to hide evidence of compromised signing identities, making supply chain attacks harder to detect via Rekor log monitoring.

🟢

If Mitigated

With proper monitoring and artifact verification, the actual signature still validates correctly, so malicious artifacts would still be detected if signature verification is properly implemented elsewhere.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a compromised signing identity and ability to create cryptographically valid but mismatched bundles with time-correct log entries.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.1.0

Vendor Advisory: https://github.com/sigstore/sigstore-java/security/advisories/GHSA-q4xm-6fjc-5f6w

Restart Required: No

Instructions:

1. Update sigstore-java dependency to version 1.1.0 or later. 2. For Maven: Update pom.xml to <version>1.1.0</version> in sigstore-java dependency. 3. For Gradle: Update build.gradle to implementation 'dev.sigstore:sigstore-java:1.1.0'. 4. Rebuild and redeploy applications.

🧯 If You Can't Patch

  • Implement additional verification layers to cross-check bundle contents against expected artifacts
  • Enhance monitoring of Rekor transparency logs for suspicious signing patterns

🔍 How to Verify

Check if Vulnerable:

Check if your application uses sigstore-java version below 1.1.0 and calls KeylessVerifier.verify() methods.

Check Version:

For Maven: mvn dependency:tree | grep sigstore-java. For Gradle: gradle dependencies | grep sigstore-java.

Verify Fix Applied:

Verify sigstore-java dependency is version 1.1.0 or higher and test verification functionality with known good and bad bundles.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected verification successes with mismatched bundle timestamps
  • Verification logs showing successful validation without corresponding Rekor log entries

Network Indicators:

  • Unusual patterns of bundle verification requests
  • Verification requests that succeed without expected transparency log queries

SIEM Query:

source="application_logs" AND ("KeylessVerifier" OR "sigstore-java") AND ("verify" OR "verification") AND status="success" NOT "Rekor"

🔗 References

📤 Share & Export