Open mend-bolt-for-github[bot] opened 4 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2020-15113 - High Severity Vulnerability
Vulnerable Library - github.com/etcd-io/etcd-v3.4.3
Distributed reliable key-value store for the most critical data of a distributed system
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd-v3.4.3** (Vulnerable Library)
Found in HEAD commit: 62183f719db48021c16ed24298bf24a3c5547124
Found in base branch: master
Vulnerability Details
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
Publish Date: 2020-08-05
URL: CVE-2020-15113
CVSS 3 Score Details (7.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2020-08-05
Fix Resolution: 3.4.10, 3.3.23
Step up your Open Source Security Game with Mend here