CVE-2024-53267
📋 TL;DR
This vulnerability in sigstore-java allows attackers to present a validly-signed but mismatched bundle that appears to be logged in a transparency log, even though the signing event wasn't actually logged. This affects clients using KeylessVerifier.verify() to verify software artifacts, potentially allowing malicious actors to hide compromised signing events from log monitoring systems.
💻 Affected Systems
- sigstore-java
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers can create fake proof of logging for malicious software signatures, bypassing transparency log monitoring while still appearing properly verified to end users.
Likely Case
Sophisticated attackers could use this to hide evidence of compromised signing identities, making supply chain attacks harder to detect via Rekor log monitoring.
If Mitigated
With proper monitoring and artifact verification, the actual signature still validates correctly, so malicious artifacts would still be detected if signature verification is properly implemented elsewhere.
🎯 Exploit Status
Exploitation requires a compromised signing identity and ability to create cryptographically valid but mismatched bundles with time-correct log entries.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v1.1.0
Vendor Advisory: https://github.com/sigstore/sigstore-java/security/advisories/GHSA-q4xm-6fjc-5f6w
Restart Required: No
Instructions:
1. Update sigstore-java dependency to version 1.1.0 or later. 2. For Maven: Update pom.xml to <version>1.1.0</version> in sigstore-java dependency. 3. For Gradle: Update build.gradle to implementation 'dev.sigstore:sigstore-java:1.1.0'. 4. Rebuild and redeploy applications.
🧯 If You Can't Patch
- Implement additional verification layers to cross-check bundle contents against expected artifacts
- Enhance monitoring of Rekor transparency logs for suspicious signing patterns
🔍 How to Verify
Check if Vulnerable:
Check if your application uses sigstore-java version below 1.1.0 and calls KeylessVerifier.verify() methods.
Check Version:
For Maven: mvn dependency:tree | grep sigstore-java. For Gradle: gradle dependencies | grep sigstore-java.
Verify Fix Applied:
Verify sigstore-java dependency is version 1.1.0 or higher and test verification functionality with known good and bad bundles.
📡 Detection & Monitoring
Log Indicators:
- Unexpected verification successes with mismatched bundle timestamps
- Verification logs showing successful validation without corresponding Rekor log entries
Network Indicators:
- Unusual patterns of bundle verification requests
- Verification requests that succeed without expected transparency log queries
SIEM Query:
source="application_logs" AND ("KeylessVerifier" OR "sigstore-java") AND ("verify" OR "verification") AND status="success" NOT "Rekor"