The CHECK command in Cosign 2.0.1 and earlier allows remote attackers to bypass authentication requirements via CR (r) sequences in the cosign cookie parameter.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cosign | Cosign | 0.7.0 (including) | 0.7.0 (including) |
Cosign | Cosign | 0.8.0 (including) | 0.8.0 (including) |
Cosign | Cosign | 0.9.0 (including) | 0.9.0 (including) |
Cosign | Cosign | 1.0 (including) | 1.0 (including) |
Cosign | Cosign | 1.1 (including) | 1.1 (including) |
Cosign | Cosign | 1.5 (including) | 1.5 (including) |
Cosign | Cosign | 1.6 (including) | 1.6 (including) |
Cosign | Cosign | 1.7 (including) | 1.7 (including) |
Cosign | Cosign | 1.8 (including) | 1.8 (including) |
Cosign | Cosign | 1.8.5 (including) | 1.8.5 (including) |
Cosign | Cosign | 1.9 (including) | 1.9 (including) |
Cosign | Cosign | 2.0.1 (including) | 2.0.1 (including) |