CVE-2023-32082 – etcd key name can be accessed via LeaseTimeToLive API
https://notcve.org/view.php?id=CVE-2023-32082
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.26 and 3.5.9, the LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC). Versions 3.4.26 and 3.5.9 fix this issue. There are no known workarounds. • https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md https://github.com/etcd-io/etcd/pull/15656 https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298 https://access.redhat.com/security/cve/CVE-2023-32082 https://bugzilla.redhat.com/show_bug.cgi?id=2208131 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2021-28235 – etcd: Information discosure via debug function
https://notcve.org/view.php?id=CVE-2021-28235
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function. A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. • http://etcd.com https://github.com/etcd-io/etcd https://github.com/etcd-io/etcd/pull/15648 https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png https://access.redhat.com/security/cve/CVE-2021-28235 https://bugzilla.redhat.com/show_bug.cgi?id=2184441 • CWE-287: Improper Authentication •
CVE-2020-15136 – Improper authentication in etcd
https://notcve.org/view.php?id=CVE-2020-15136
In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality. En ectd anterior a las versiones 3.4.10 y 3.3.23, la autenticación TLS de la puerta de enlace solo se aplica a los endpoints detectados en los registros SRV de DNS. • https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP https://access.redhat.com/security/cve/CVE-2020-15136 https://bugzilla.redhat.com/show_bug.cgi?id=1868880 • CWE-287: Improper Authentication CWE-306: Missing Authentication for Critical Function •
CVE-2020-15114 – Denial of Service in etcd
https://notcve.org/view.php?id=CVE-2020-15114
In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. En etcd anteriores a las versiones 3.3.23 y 3.4.10, la puerta de enlace etcd es un proxy TCP simple para permitir el acceso y detección de servicios básicos. Sin embargo, es posible incluir la dirección de la puerta de enlace como endpoint. • https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP https://access.redhat.com/security/cve/CVE-2020-15114 https://bugzilla.redhat.com/show_bug.cgi?id=1868874 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2020-15115 – No minimum password length in etcd
https://notcve.org/view.php?id=CVE-2020-15115
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort. etcd anterior a las versiones 3.3.23 y 3.4.10, no lleva a cabo ninguna comprobación de longitud de contraseña, lo que permite contraseñas muy cortas, como aquellas con una longitud de uno. Esto puede permitir a un atacante adivinar o forzar las contraseñas de los usuarios con poco esfuerzo computacional A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users' passwords with little computational effort. The highest threat from this vulnerability is to confidentiality. • https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP https://access.redhat.com/security/cve/CVE-2020-15115 https://bugzilla.redhat.com/show_bug.cgi?id=1868878 • CWE-305: Authentication Bypass by Primary Weakness CWE-521: Weak Password Requirements •