GHSA-pwjx-qhcg-rvj4: Certificate Revocation Bypass via Iterator Exhaustion in rustls-webpki
Vulnerability ID: GHSA-PWJX-QHCG-RVJ4
CVSS Score: 4.4
Published: 2026-03-20
The rustls-webpki crate contains a logic flaw in its certificate revocation enforcement mechanism. Due to the improper reuse of one-shot DER iterators during Certificate Revocation List (CRL) processing, the verifier fails to match legitimate Distribution Points (DPs) to Issuing Distribution Points (IDPs), potentially leading to the acceptance of revoked certificates under permissive configurations.
TL;DR
A logic bug in rustls-webpki's CRL processing allows revoked certificates to be accepted as valid. The vulnerability stems from iterator exhaustion when parsing multiple URIs in Distribution Points and Issuing Distribution Points.
⚠️ Exploit Status: POC
Technical Details
- CVSS Score: 4.4 (Medium)
- Attack Vector: Network
- CWE ID: CWE-295
- Exploit Status: Proof of Concept
- Impact: High Integrity Loss
- KEV Status: Not Listed
Affected Systems
- rustls-webpki
-
rustls-webpki: >= 0.101.0, < 0.103.10 (Fixed in:
0.103.10) -
rustls-webpki: >= 0.104.0-alpha.1, < 0.104.0-alpha.5 (Fixed in:
0.104.0-alpha.5)
Code Analysis
Commit: e459078
Pre-fix state containing the vulnerable iterator exhaustion logic.
Mitigation Strategies
- Update rustls-webpki to a patched version
- Configure UnknownStatusPolicy::Deny to prevent bypass
Remediation Steps:
- Identify projects depending on vulnerable versions of rustls-webpki using
cargo tree. - Update
Cargo.tomlto require rustls-webpki >= 0.103.10. - Regenerate
Cargo.lockand recompile the application. - If updating is not immediately possible, modify the TLS configuration to strictly enforce revocation by setting
UnknownStatusPolicytoDeny.
References
- GitHub Advisory GHSA-pwjx-qhcg-rvj4
- OSV Record
- rustls-webpki Repository
- Related Tauri Issue #15132
- Related Pingora Issue #843
Read the full report for GHSA-PWJX-QHCG-RVJ4 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)