All the vulnerabilites related to etcd-io - etcd
cve-2020-15115
Vulnerability from cvelistv5
Published
2020-08-06 21:55
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
No minimum password length in etcd
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.734Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.3.23" }, { "status": "affected", "version": "\u003c 3.4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "{\"CWE-521\":\"Weak Password Requirements\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-4993-m7g5-r9hh", "discovery": "UNKNOWN" }, "title": "No minimum password length in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15115", "STATE": "PUBLIC", "TITLE": "No minimum password length in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-521\":\"Weak Password Requirements\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-4993-m7g5-r9hh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15115", "datePublished": "2020-08-06T21:55:12", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15113
Vulnerability from cvelistv5
Published
2020-08-05 19:30
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Improper Preservation of Permissions in etcd
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.3.23" }, { "status": "affected", "version": "\u003c 3.4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "{\"CWE-281\":\"Improper Preservation of Permissions\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-chh6-ppwq-jh92", "discovery": "UNKNOWN" }, "title": "Improper Preservation of Permissions in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15113", "STATE": "PUBLIC", "TITLE": "Improper Preservation of Permissions in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700)." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-281\":\"Improper Preservation of Permissions\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-chh6-ppwq-jh92", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15113", "datePublished": "2020-08-05T19:30:13", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15112
Vulnerability from cvelistv5
Published
2020-08-05 20:00
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Improper Input Validation in etcd
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.3.23" }, { "status": "affected", "version": "\u003c 3.4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime panic when reading the entry." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-m332-53r6-2w93", "discovery": "UNKNOWN" }, "title": "Improper Input Validation in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15112", "STATE": "PUBLIC", "TITLE": "Improper Input Validation in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime panic when reading the entry." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-m332-53r6-2w93", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15112", "datePublished": "2020-08-05T20:00:15", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15114
Vulnerability from cvelistv5
Published
2020-08-06 22:25
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Denial of Service in etcd
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.3.23" }, { "status": "affected", "version": "\u003c 3.4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "{\"CWE-400\":\"Uncontrolled Resource Consumption\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-2xhq-gv6c-p224", "discovery": "UNKNOWN" }, "title": "Denial of Service in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15114", "STATE": "PUBLIC", "TITLE": "Denial of Service in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-400\":\"Uncontrolled Resource Consumption\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-2xhq-gv6c-p224", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15114", "datePublished": "2020-08-06T22:25:12", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32082
Vulnerability from cvelistv5
Published
2023-05-11 19:22
Modified
2024-08-02 15:03
Severity ?
EPSS score ?
Summary
etcd key name can be accessed via LeaseTimeToLive API
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298 | x_refsource_CONFIRM | |
https://github.com/etcd-io/etcd/pull/15656 | x_refsource_MISC | |
https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md | x_refsource_MISC | |
https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:03:29.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298" }, { "name": "https://github.com/etcd-io/etcd/pull/15656", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/pull/15656" }, { "name": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md" }, { "name": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.4.26" }, { "status": "affected", "version": "\u003e= 3.5.0, \u003c 3.5.9" } ] } ], "descriptions": [ { "lang": "en", "value": "etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.26 and 3.5.9, the LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn\u0027t have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC). Versions 3.4.26 and 3.5.9 fix this issue. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-11T19:22:56.442Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298" }, { "name": "https://github.com/etcd-io/etcd/pull/15656", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/etcd-io/etcd/pull/15656" }, { "name": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md" }, { "name": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md" } ], "source": { "advisory": "GHSA-3p4g-rcw5-8298", "discovery": "UNKNOWN" }, "title": "etcd key name can be accessed via LeaseTimeToLive API" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32082", "datePublished": "2023-05-11T19:22:56.442Z", "dateReserved": "2023-05-01T16:47:35.316Z", "dateUpdated": "2024-08-02T15:03:29.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15136
Vulnerability from cvelistv5
Published
2020-08-06 22:45
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Improper authentication in etcd
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q | x_refsource_CONFIRM | |
https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003e= 3.4.0, \u003c 3.4.10" }, { "status": "affected", "version": "\u003c 3.3.23" } ] } ], "descriptions": [ { "lang": "en", "value": "In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "{\"CWE-287\":\"Improper Authentication\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-wr2v-9rpq-c35q", "discovery": "UNKNOWN" }, "title": "Improper authentication in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15136", "STATE": "PUBLIC", "TITLE": "Improper authentication in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003e= 3.4.0, \u003c 3.4.10" }, { "version_value": "\u003c 3.3.23" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-287\":\"Improper Authentication\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" }, { "name": "https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md", "refsource": "MISC", "url": "https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-wr2v-9rpq-c35q", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15136", "datePublished": "2020-08-06T22:45:14", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15106
Vulnerability from cvelistv5
Published
2020-08-05 19:05
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Improper Input Validation in etcd
References
▼ | URL | Tags |
---|---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.3.23" }, { "status": "affected", "version": "\u003c 3.4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-p4g4-wgrh-qrg2", "discovery": "UNKNOWN" }, "title": "Improper Input Validation in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15106", "STATE": "PUBLIC", "TITLE": "Improper Input Validation in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-p4g4-wgrh-qrg2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15106", "datePublished": "2020-08-05T19:05:13", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }