Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-528j-9r78-wffx

Опубликовано: 06 окт. 2022
Источник: github
Github: Прошло ревью

Описание

etcd user credentials are stored in WAL logs in plaintext

Vulnerability type

Data Exposure

Workarounds

The etcd assumes that the on disk files are secure. The possible fixes have been provided, however, it is the responsibility of the etcd users to make sure that the etcd server WAL log files are secure. The etcd doesn't encrypt key/value data stored on disk drives.

Detail

User credentials (login and password) are stored in WAL entries on each user authentication. If the WAL log files are not secure, it can potentially expose sensitive information.

References

Find out more on this vulnerability in the security audit report

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

go.etcd.io/etcd/client/v3

go
Затронутые версииВерсия исправления

>= 3.4.0, < 3.4.10

3.4.10

Наименование

go.etcd.io/etcd/client/v3

go
Затронутые версииВерсия исправления

< 3.3.23

3.3.23

Дефекты

CWE-256

Дефекты

CWE-256