Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15113
HistoryAug 05, 2020 - 7:30 p.m.

CVE-2020-15113 Improper Preservation of Permissions in etcd

2020-08-0519:30:13
CWE-281
GitHub_M
www.cve.org
7
etcd
directory paths
permissions
security vulnerability
tls connections
permission checks

CVSS3

5.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

12.6%

In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).

CNA Affected

[
  {
    "product": "etcd",
    "vendor": "etcd-io",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.3.23"
      },
      {
        "status": "affected",
        "version": "< 3.4.10"
      }
    ]
  }
]

CVSS3

5.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

12.6%