chore(deps): update module github.com/sigstore/fulcio to v1.8.5 [security] #6641
+2,267
−2,586
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.8.1→v1.8.5Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2026-22772
Security Disclosure: SSRF via MetaIssuer Regex Bypass
Summary
Fulcio's
metaRegex()function uses unanchored regex, allowing attackers to bypass MetaIssuer URL validation and trigger SSRF to arbitrary internal services.Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF.
Impact
Patches
Upgrade to v1.8.5.
Workarounds
None. If anchors are included in the meta issuer configuration URL, they will be escaped before the regular expression is compiled, not making this a sufficient mitigation. Deployments must upgrade to the latest Fulcio release v1.8.5.
Affected Code
File:
pkg/config/config.goFunction:
metaRegex()(lines 143-156)The Bug
The regex has no
^(start) or$(end) anchors. Go'sregexp.MatchString()does substring matching, so:Exploit
issclaim:https://attacker.com/path/https://oidc.eks.x.amazonaws.com/id/yGetIssuer()matches this against MetaIssuer patternsoidc.NewProvider()with attacker's URLattacker.com, notamazonaws.comjwks_uripointing to internal serviceRelease Notes
sigstore/fulcio (github.com/sigstore/fulcio)
v1.8.5Compare Source
Vulnerability Fixes
v1.8.4Compare Source
Same changelog as v1.8.3, with a few dependency bumps to resolve a breaking API change
v1.8.3Compare Source
Vulnerability Fixes
Features
Testing
v1.8.2Compare Source
Testing
Configuration
📅 Schedule: Branch creation - "" in timezone UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.