Skip to content

etcd vulnerable to TOCTOU of gateway endpoint authentication

Low severity GitHub Reviewed Published Aug 5, 2020 in etcd-io/etcd • Updated Jan 12, 2023

Package

gomod go.etcd.io/etcd/v3 (Go)

Affected versions

>= 3.4.0, < 3.4.10
< 3.3.23

Patched versions

3.4.10
3.3.23

Description

Vulnerability type

Authentication

Workarounds

Refer to the gateway documentation. The vulnerability was spotted due to unclear documentation of how the gateway handles endpoints validation.

Detail

The gateway only authenticates endpoints detected from DNS SRV records, and it only authenticates the detected endpoints once. Therefore, if an endpoint changes its authentication settings, the gateway will continue to assume the endpoint is still authenticated. The auditors has noted that appropriate documentation of this validation functionality plus deprecation of this misleading functionality is an acceptable path forward.

References

Find out more on this vulnerability in the security audit report

For more information

If you have any questions or comments about this advisory:

References

@spzala spzala published to etcd-io/etcd Aug 5, 2020
Published to the GitHub Advisory Database Oct 6, 2022
Reviewed Oct 6, 2022
Last updated Jan 12, 2023

Severity

Low

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-h8g9-6gvh-5mrc

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.