Weak Password Requirements The advisory has been revoked - it doesn't affect any version of package go.etcd.io/etcd/etcdctl/v3  (opens in a new tab)


Threat Intelligence

EPSS
0.22% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GOETCDIOETCDETCDCTLV3-3040869
  • published7 Oct 2022
  • disclosed6 Oct 2022
  • creditUnknown

Introduced: 6 Oct 2022

CVE-2020-15115  (opens in a new tab)
CWE-521  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Weak Password Requirements due to not having a minimum password length during user creation or user password update operations. This may allow an attacker to guess or brute-force user's passwords with little computational effort.

Note

According to the documentation, this security finding should not be considered a vulnerability in the library itself, but a security requirement which falls out of this library's scope.