Authentication Bypass Affecting github.com/etcd-io/etcd package, versions <3.3.23 >=3.4.0-rc.0 <3.4.10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMETCDIOETCD-6227571
- published 5 Feb 2024
- disclosed 31 Jan 2024
- credit Unknown
How to fix?
Upgrade github.com/etcd-io/etcd
to version 3.3.23, 3.4.10 or higher.
Overview
github.com/etcd-io/etcd is a distributed reliable key-value store for the most critical data of a distributed system
Affected versions of this package are vulnerable to Authentication Bypass due to improper validation of endpoints during the discoverEndpoints
process. An attacker can bypass TLS authentication by specifying endpoints directly via the --endpoints
flag, which are not subject to the same DNS SRV record checks. This is only exploitable if the attacker has the ability to influence the gateway's startup parameters or manipulate DNS responses.