Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-15115

Опубликовано: 05 авг. 2020
Источник: redhat
CVSS3: 7.5

Описание

etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.

A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users' passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.

Отчет

Red Hat OpenShift Container Platform (RHOCP) doesn't use etcd role-based access control (rbac), instead of that, OpenShift OAuth authentication is used. Therefore, RHOCP is not affected by this vulnerability. A similar configuration is in place in Red Hat OpenStack Platform (RHOSP) as etcd does not use a password for access and instead uses a TLS certificate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2etcdNot affected
Red Hat Enterprise Linux 7etcdAffected
Red Hat OpenShift Container Platform 4openshift4/ose-etcd-rhel9Not affected
Red Hat OpenStack Platform 15 (Stein)etcdFix deferred
Red Hat Storage 3etcdAffected
Red Hat OpenStack Platform 16.1etcdFixedRHSA-2021:091617.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=1868878etcd: improper validation of passwords allow an attacker to guess or brute-force user's passwords

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.8
ubuntu
больше 5 лет назад

etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.

CVSS3: 5.8
nvd
больше 5 лет назад

etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.

CVSS3: 7.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 5.8
debian
больше 5 лет назад

etcd before versions 3.3.23 and 3.4.10 does not perform any password l ...

CVSS3: 5.8
github
больше 3 лет назад

etcd has no minimum password length

7.5 High

CVSS3