CVE-2018-1098
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
Se ha encontrado un fallo de Cross-Site Request Forgery (CSRF) en etcd, en versiones 3.3.1 y anteriores. Un atacante puede configurar un sitio web que intenta enviar una petición POST al servidor etcd y modificar una clave. La adición de una clave se realiza con PUT, por lo que es teóricamente seguro (no se puede realizar PUT desde un formulario HTML o similares), pero POST permite la creación de claves in-order que puede enviar un atacante.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-04 CVE Reserved
- 2018-04-03 CVE Published
- 2023-08-25 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1552714 | Issue Tracking |
URL | Date | SRC |
---|---|---|
https://github.com/coreos/etcd/issues/9353 | 2024-08-05 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Etcd Search vendor "Redhat" for product "Etcd" | <= 3.3.1 Search vendor "Redhat" for product "Etcd" and version " <= 3.3.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 30 Search vendor "Fedoraproject" for product "Fedora" and version "30" | - |
Affected
|