{
  "threat_severity" : "Moderate",
  "public_date" : "2025-02-11T15:48:59Z",
  "bugzilla" : {
    "description" : "distribution: Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT",
    "id" : "2344940",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2344940"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-639",
  "details" : [ "Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication.", "A flaw was found in Distribution. Certain versions with token authentication enabled may be vulnerable to an issue where token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue is due to how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys but doesn't verify that the key material matches." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2025-03-12T00:00:00Z",
    "advisory" : "RHSA-2025:2445",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "openshift4/ose-operator-framework-tools-rhel9:v4.17.0-202503052005.p0.ge9262fe.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2025-03-12T00:00:00Z",
    "advisory" : "RHSA-2025:2445",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "openshift4/ose-operator-lifecycle-manager-rhel9:v4.17.0-202503052005.p0.ge9262fe.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2025-03-12T00:00:00Z",
    "advisory" : "RHSA-2025:2445",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "openshift4/ose-operator-registry-rhel9:v4.17.0-202503052005.p0.ge9262fe.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.18",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2449",
    "cpe" : "cpe:/a:redhat:openshift:4.18::el9",
    "package" : "openshift4/ose-operator-framework-tools-rhel9:v4.18.0-202503041603.p0.g877b6fd.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.18",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2449",
    "cpe" : "cpe:/a:redhat:openshift:4.18::el9",
    "package" : "openshift4/ose-operator-lifecycle-manager-rhel9:v4.18.0-202503041603.p0.g877b6fd.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.18",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2449",
    "cpe" : "cpe:/a:redhat:openshift:4.18::el9",
    "package" : "openshift4/ose-operator-registry-rhel9:v4.18.0-202503041603.p0.g877b6fd.assembly.stream.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Multiarch Tuning Operator",
    "fix_state" : "Will not fix",
    "package_name" : "multiarch-tuning/multiarch-tuning-rhel9-operator",
    "cpe" : "cpe:/a:redhat:multiarch_tuning_operator"
  }, {
    "product_name" : "OpenShift API for Data Protection",
    "fix_state" : "Fix deferred",
    "package_name" : "oadp/oadp-velero-plugin-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_api_data_protection:1"
  }, {
    "product_name" : "OpenShift Serverless",
    "fix_state" : "Will not fix",
    "package_name" : "openshift-serverless-1/serverless-ingress-rhel8",
    "cpe" : "cpe:/a:redhat:serverless:1"
  }, {
    "product_name" : "OpenShift Serverless",
    "fix_state" : "Will not fix",
    "package_name" : "openshift-serverless-1/serverless-kn-operator-rhel8",
    "cpe" : "cpe:/a:redhat:serverless:1"
  }, {
    "product_name" : "OpenShift Serverless",
    "fix_state" : "Will not fix",
    "package_name" : "openshift-serverless-1/serverless-must-gather-rhel8",
    "cpe" : "cpe:/a:redhat:serverless:1"
  }, {
    "product_name" : "OpenShift Serverless",
    "fix_state" : "Will not fix",
    "package_name" : "openshift-serverless-1/serverless-openshift-kn-rhel8-operator",
    "cpe" : "cpe:/a:redhat:serverless:1"
  }, {
    "product_name" : "Red Hat Advanced Cluster Management for Kubernetes 2",
    "fix_state" : "Fix deferred",
    "package_name" : "rhacm2/multicluster-operators-subscription-rhel8",
    "cpe" : "cpe:/a:redhat:acm:2"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "microshift",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-cli",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-cli-artifacts",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Will not fix",
    "package_name" : "openshift4/ose-console",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-deployer-rhel9",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Fix deferred",
    "package_name" : "openshift4/ose-docker-registry-rhel9",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-openshift-apiserver-rhel9",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-tests",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-tools-rhel8",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift-clients",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift GitOps",
    "fix_state" : "Affected",
    "package_name" : "openshift-gitops-1/argocd-rhel8",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1"
  }, {
    "product_name" : "Red Hat OpenShift GitOps",
    "fix_state" : "Affected",
    "package_name" : "openshift-gitops-1/argocd-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1"
  }, {
    "product_name" : "Red Hat Trusted Application Pipeline",
    "fix_state" : "Affected",
    "package_name" : "rhtap-cli/rhtap-cli-rhel9",
    "cpe" : "cpe:/a:redhat:trusted_application_pipeline:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-24976\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-24976\nhttps://github.com/distribution/distribution/commit/5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd\nhttps://github.com/distribution/distribution/security/advisories/GHSA-phw4-mc57-4hwc" ],
  "name" : "CVE-2025-24976",
  "csaw" : false
}