Closed
Description
CVE-2020-15113 references github.com/etcd-io/etcd, which may be a Go module.
Description:
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
References:
- NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-15113
- advisory: GHSA-chh6-ppwq-jh92
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/
- Imported by: https://pkg.go.dev/github.com/etcd-io/etcd?tab=importedby
Cross references:
- Module github.com/etcd-io/etcd appears in issue x/vulndb: potential Go vuln in github.com/etcd-io/etcd: CVE-2021-28235 #1689 EFFECTIVELY_PRIVATE
- Module github.com/etcd-io/etcd appears in issue x/vulndb: potential Go vuln in github.com/etcd-io/etcd: CVE-2023-32082 #1771 EFFECTIVELY_PRIVATE
- Module github.com/etcd-io/etcd appears in issue x/vulndb: potential Go vuln in github.com/etcd-io/etcd: CVE-2022-34038 #2016 NOT_A_VULNERABILITY
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/etcd-io/etcd
vulnerable_at: 2.3.8+incompatible
packages:
- package: etcd
cves:
- CVE-2020-15113
references:
- advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/