A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (cant PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Etcd | Redhat | * | 3.3.1 (including) |
Etcd | Ubuntu | artful | * |
Etcd | Ubuntu | bionic | * |
Etcd | Ubuntu | cosmic | * |
Etcd | Ubuntu | devel | * |
Etcd | Ubuntu | disco | * |
Etcd | Ubuntu | eoan | * |
Etcd | Ubuntu | esm-apps/bionic | * |
Etcd | Ubuntu | esm-apps/focal | * |
Etcd | Ubuntu | esm-apps/jammy | * |
Etcd | Ubuntu | esm-apps/noble | * |
Etcd | Ubuntu | esm-apps/xenial | * |
Etcd | Ubuntu | focal | * |
Etcd | Ubuntu | groovy | * |
Etcd | Ubuntu | hirsute | * |
Etcd | Ubuntu | impish | * |
Etcd | Ubuntu | jammy | * |
Etcd | Ubuntu | kinetic | * |
Etcd | Ubuntu | lunar | * |
Etcd | Ubuntu | mantic | * |
Etcd | Ubuntu | noble | * |
Etcd | Ubuntu | oracular | * |
Etcd | Ubuntu | upstream | * |
Etcd | Ubuntu | xenial | * |