Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fcv2-xgw5-pqxf | sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 24 Jan 2026 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 24 Jan 2026 01:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sigstore
Sigstore sigstore-go |
|
| Vendors & Products |
Sigstore
Sigstore sigstore-go |
Fri, 23 Jan 2026 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release. | |
| Title | sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-23T19:55:42.582Z
Reserved: 2026-01-21T18:38:22.474Z
Link: CVE-2026-24137
Updated: 2026-01-23T19:55:38.860Z
Status : Received
Published: 2026-01-23T00:15:52.553
Modified: 2026-01-23T00:15:52.553
Link: CVE-2026-24137
No data.
OpenCVE Enrichment
Updated: 2026-01-23T19:27:05Z
Github GHSA