Open mend-bolt-for-github[bot] opened 1 year ago
github.com/etcd-io/etcd-v3.2.24
Distributed reliable key-value store for the most critical data of a distributed system
Library home page: https://proxy.golang.org/github.com/etcd-io/etcd/@v/v3.2.24+incompatible.zip
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd-v3.2.24** (Vulnerable Library)
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd/etcdserver-v3.2.24** (Vulnerable Library)
Found in HEAD commit: cd87321da747fd23c6285641b10b0432943dfed6
Found in base branch: master
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.
Publish Date: 2023-04-04
URL: CVE-2021-28235
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-gmph-wf7j-9gcm
Release Date: 2023-04-04
Fix Resolution: v3.4.25,v3.5.8
Step up your Open Source Security Game with Mend here
CVE-2021-28235 - Critical Severity Vulnerability
Vulnerable Libraries - github.com/etcd-io/etcd-v3.2.24, github.com/etcd-io/etcd/etcdserver-v3.2.24
github.com/etcd-io/etcd-v3.2.24
Distributed reliable key-value store for the most critical data of a distributed system
Library home page: https://proxy.golang.org/github.com/etcd-io/etcd/@v/v3.2.24+incompatible.zip
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd-v3.2.24** (Vulnerable Library)
github.com/etcd-io/etcd/etcdserver-v3.2.24
Distributed reliable key-value store for the most critical data of a distributed system
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd/etcdserver-v3.2.24** (Vulnerable Library)
Found in HEAD commit: cd87321da747fd23c6285641b10b0432943dfed6
Found in base branch: master
Vulnerability Details
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.
Publish Date: 2023-04-04
URL: CVE-2021-28235
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-gmph-wf7j-9gcm
Release Date: 2023-04-04
Fix Resolution: v3.4.25,v3.5.8
Step up your Open Source Security Game with Mend here