First published: Fri Mar 05 2021(Updated: )
In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the "aws_iid" Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the value of an EC2 tag prior to attestation, and the attestor is configured for agent ID templating where the tag value is the last element in the path. This issue has been fixed in SPIRE versions 0.11.3 and 0.12.1
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cncf Spire | <0.8.5 | |
Cncf Spire | >=0.9.0<0.9.4 | |
Cncf Spire | >=0.10.0<0.10.2 | |
Cncf Spire | >=0.11.0<0.11.3 | |
Cncf Spire | >=0.12.0<0.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27099 is a vulnerability in SPIRE where the aws_iid Node Attestor improperly normalizes the path provided through the agent ID templating feature, potentially allowing the issuance of an arbitrary SPIFFE ID within the same trust domain.
CVE-2021-27099 has a severity rating of 6.8 (medium).
CVE-2021-27099 affects SPIRE versions 0.8.5, 0.9.0-0.9.4, 0.10.0-0.10.2, 0.11.0-0.11.3, and 0.12.0-0.12.1.
The vulnerability in the aws_iid Node Attestor in SPIRE occurs due to improper normalization of the path provided through the agent ID templating feature, which can be exploited by an attacker to issue an arbitrary SPIFFE ID within the same trust domain.
To fix CVE-2021-27099, it is recommended to upgrade SPIRE to version 0.8.5, 0.9.4, 0.10.2, 0.11.3, or 0.12.1.