Cross-site Request Forgery (CSRF) Affecting go.etcd.io/etcd/v3/etcdmain package, versions <3.4.0
Threat Intelligence
EPSS
0.21% (60th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GOETCDIOETCDV3ETCDMAIN-1083902
- published 26 Apr 2018
- disclosed 25 Feb 2018
- credit zelivans
Introduced: 25 Feb 2018
CVE-2018-1098 Open this link in a new tabHow to fix?
Upgrade go.etcd.io/etcd/v3/etcdmain
to version 3.4.0 or higher.
Overview
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
References
CVSS Scores
version 3.1