PT-2026-32611 · Go · Github.Com/Sigstore/Timestamp-Authority/V2
Published
2026-04-14
·
Updated
2026-04-14
·
CVE-2026-39984
CVSS v3.1
5.5
Medium
| AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
Authorization bypass via certificate bag manipulation in sigstore/timestamp-authority verifier
An authorization bypass vulnerability exists in sigstore/timestamp-authority verifier (timestamp-authority/v2/pkg/verification):
VerifyTimestampResponse function correctly verifies the certificate chain but when the TSA specific constraints are verified in VerifyLeafCert, the first non-CA certificate from the PKCS#7 certificate bag is used instead of the leaf certificate from the certificate chain. An attacker can exploit this by prepending a forged certificate to the certificate bag while the message is signed with an authorized key. The library validates the signature using the one certificate but performs authorization checks on the another, allowing an attacker to bypass some authorization controls.This vulnerability does not apply to timestamp-authority service, only to users of
timestamp-authority/v2/pkg/verification package.This vulnerability does not apply to sigstore-go even though it is a user of
timestamp-authority/v2/pkg/verification: Providing TSACertificate option to VerifyTimestampResponse fully mitigates the issue.Patches
The issue will be fixed in timestamp-authority 2.0.6
Workarounds
Users of
VerifyTimestampResponse can use the TSACertificate option to specify the exact certificate they expect to be used: this fully mitigates the issue.References
This issue was found after reading CVE-2026-33753 / GHSA-3xxc-pwj6-jgrj (originally reported by @Jaynornj and @Pr00fOf3xpl0it)
Fix
Improper Certificate Validation
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Github.Com/Sigstore/Timestamp-Authority/V2