CVE-2026-33753: Trust Boundary Confusion and Authorization Bypass in rfc3161-client
Vulnerability ID: CVE-2026-33753
CVSS Score: 6.2
Published: 2026-04-08
The rfc3161-client Python library prior to version 1.0.6 contains a trust boundary confusion vulnerability in its Time-Stamp Protocol (TSP) implementation. A flawed topological heuristic used for identifying the signer's leaf certificate allows an attacker to inject spoofed certificates and bypass authorization checks.
TL;DR
An adversary-in-the-middle can spoof TimeStamping Authority identities in rfc3161-client < 1.0.6 by injecting crafted certificates into the PKCS#7 bag, bypassing Common Name validation.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-295
- Attack Vector: Local / Adversary-in-the-Middle
- CVSS Score: 6.2
- Impact: Authorization Bypass
- Exploit Status: Proof of Concept
- CISA KEV: Not Listed
Affected Systems
- rfc3161-client < 1.0.6
-
rfc3161-client: < 1.0.6 (Fixed in:
1.0.6)
Code Analysis
Commit: 4f7d372
Fix for GHSA-3xxc-pwj6-jgrj: Replace heuristic with explicit issuerAndSerialNumber lookup
Exploit Details
- Regression Test: Regression test included in the fix commit demonstrates the vulnerability.
Mitigation Strategies
- Upgrade rfc3161-client to version 1.0.6 or newer.
- Implement strong TLS certificate pinning for all communications with TimeStamping Authorities.
- Monitor incoming TimeStampResponses for unusual or overly large certificate bags.
Remediation Steps:
- Identify all projects utilizing the
rfc3161-clientdependency. - Update the dependency explicitly to version 1.0.6 in
requirements.txt,Pipfile, orpyproject.toml. - Run the test suite to ensure the updated strictly-enforced validation logic does not break integration with internal PKI infrastructure.
- Deploy the updated application to production environments.
References
- GitHub Security Advisory (GHSA-3xxc-pwj6-jgrj)
- Fix Commit (4f7d372297b4fba7b0119e9f954e4495ec0592c0)
- CVE.org Record
- RFC 3161: Time-Stamp Protocol (TSP)
Read the full report for CVE-2026-33753 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)