Metrics
Affected Vendors & Products
Thu, 13 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.17::el9 |
Wed, 12 Mar 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4.18::el9 | |
Vendors & Products |
Redhat
Redhat openshift |
Sat, 15 Feb 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Feb 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication. | |
Title | Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T20:51:44.516Z
Reserved: 2025-01-29T15:18:03.211Z
Link: CVE-2025-24976

Updated: 2025-02-12T20:47:16.894Z

Status : Received
Published: 2025-02-11T16:15:52.163
Modified: 2025-02-11T16:15:52.163
Link: CVE-2025-24976
