Missing Authentication for Critical Function Affecting dgraph package, versions <23.1.0-r6


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Authentication for Critical Function vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-DGRAPH-6447596
  • published16 Mar 2024
  • disclosed6 Aug 2020

Introduced: 6 Aug 2020

CVE-2020-15136  (opens in a new tab)
CWE-306  (opens in a new tab)

How to fix?

Upgrade Chainguard dgraph to version 23.1.0-r6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dgraph package and not the dgraph package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

CVSS Scores

version 3.1