Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-15136

Опубликовано: 05 авг. 2020
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

A flaw was found in etcd. The gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag.

Отчет

In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low. A similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants. Additionally, RHOSP does not use the etcd gateway.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2etcdNot affected
Red Hat Enterprise Linux 7etcdWill not fix
Red Hat OpenStack Platform 15 (Stein)etcdFix deferred
Red Hat Storage 3etcdAffected
Red Hat OpenShift Container Platform 4.8openshift4/ose-etcdFixedRHSA-2021:243827.07.2021
Red Hat OpenStack Platform 16.1etcdFixedRHSA-2021:091617.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1868880etcd: no authentication is performed against endpoints provided in the --endpoints flag

EPSS

Процентиль: 54%
0.00308
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 5 лет назад

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

CVSS3: 6.5
nvd
больше 5 лет назад

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

CVSS3: 6.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 6.5
debian
больше 5 лет назад

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication ...

CVSS3: 6.5
github
около 2 лет назад

Etcd Gateway TLS authentication only applies to endpoints detected in DNS SRV records

EPSS

Процентиль: 54%
0.00308
Низкий

6.5 Medium

CVSS3