CVE-2026-24137

5.8 MEDIUM

📋 TL;DR

This vulnerability in sigstore's legacy TUF client allows a malicious TUF repository to trigger arbitrary file overwriting by exploiting path traversal. It affects clients directly using the TUF client in sigstore/sigstore versions 1.10.3 and below, or older Cosign versions. Public Sigstore deployment users are unaffected due to additional validation controls.

💻 Affected Systems

Products:
  • sigstore/sigstore
  • Cosign (older versions)
Versions: sigstore/sigstore ≤ 1.10.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects clients directly using the legacy TUF client. Public Sigstore deployments are unaffected due to quorum validation of TUF metadata.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file overwriting, potentially leading to privilege escalation, data destruction, or remote code execution if critical system files are targeted.

🟠

Likely Case

Local file corruption or overwriting within the application's permission scope, potentially disrupting application functionality or leaking sensitive data.

🟢

If Mitigated

No impact for properly configured systems using public Sigstore deployments or with caching disabled.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a malicious TUF repository that the client trusts. The vulnerability is straightforward path traversal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.10.4

Vendor Advisory: https://github.com/sigstore/sigstore/security/advisories/GHSA-fcv2-xgw5-pqxf

Restart Required: Yes

Instructions:

1. Update sigstore/sigstore dependency to version 1.10.4 or higher. 2. Update go.mod to require sigstore/sigstore v1.10.4+. 3. Run 'go mod tidy' to update dependencies. 4. Rebuild and redeploy affected applications.

🔧 Temporary Workarounds

Disable disk caching

all

Prevents the vulnerable caching mechanism from being used

export SIGSTORE_NO_CACHE=true

Migrate to sigstore-go TUF client

all

Use the newer TUF implementation that doesn't have this vulnerability

Replace imports from 'github.com/sigstore/sigstore/pkg/tuf' to 'github.com/sigstore/sigstore-go/pkg/tuf'

🧯 If You Can't Patch

  • Disable disk caching by setting SIGSTORE_NO_CACHE=true environment variable
  • Implement strict network controls to only allow connections to trusted TUF repositories

🔍 How to Verify

Check if Vulnerable:

Check go.mod or vendor dependencies for sigstore/sigstore version ≤ 1.10.3

Check Version:

grep 'sigstore/sigstore' go.mod | grep -E 'v1\.(10\.[0-3]|[0-9]\.)'

Verify Fix Applied:

Confirm sigstore/sigstore version is ≥ 1.10.4 in dependencies and SIGSTORE_NO_CACHE is not required

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file write operations outside cache directory
  • TUF client errors related to path validation

Network Indicators:

  • Connections to untrusted TUF repositories

SIEM Query:

process.name:"go" AND file.path:"../" AND process.args:"tuf"

🔗 References

📤 Share & Export