Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1098

Опубликовано: 03 апр. 2018
Источник: debian

Описание

A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
etcdfixed3.5.5-1experimentalpackage
etcdfixed3.4.23-1package
etcdno-dsabullseyepackage
etcdno-dsabusterpackage

Примечания

  • https://github.com/coreos/etcd/issues/9353

  • https://github.com/etcd-io/etcd/pull/9372

  • https://bugzilla.redhat.com/show_bug.cgi?id=1552714

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.

CVSS3: 6.5
redhat
почти 8 лет назад

A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.

CVSS3: 8.8
nvd
почти 8 лет назад

A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.

CVSS3: 8.8
github
почти 4 года назад

etcd Cross-site Request Forgery (CSRF)