Improper Authentication Affecting go.etcd.io/etcd/v3/auth package, versions >=3.2.0 <3.2.26>=3.3.0 <3.3.11


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.25% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GOETCDIOETCDV3AUTH-1083899
  • published16 Jan 2019
  • disclosed3 Jan 2019
  • creditMatt Wheeler

Introduced: 3 Jan 2019

CVE-2018-16886  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade go.etcd.io/etcd/v3/auth to version 3.2.26, 3.3.11 or higher.

Overview

Affected versions of this package are vulnerable to Improper Authentication. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.

Note: This is possible only when role-based access control (RBAC) is used and client-cert-auth is enabled.

CVSS Scores

version 3.1