In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the "aws_iid" Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the value of an EC2 tag prior to attestation, and the attestor is configured for agent ID templating where the tag value is the last element in the path. This issue has been fixed in SPIRE versions 0.11.3 and 0.12.1
References
Link | Resource |
---|---|
https://github.com/spiffe/spire/security/advisories/GHSA-q7gm-mjrg-44h9 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-03-05T17:04:20
Updated: 2021-03-05T17:04:20
Reserved: 2021-02-10T00:00:00
Link: CVE-2021-27099
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-05T18:15:13.067
Modified: 2021-03-16T18:47:17.367
Link: CVE-2021-27099
JSON object: View
Redhat Information
No data.
CWE