CVE-2020-15113

In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:etcd:etcd:*:*:*:*:*:*:*:*
cpe:2.3:a:etcd:etcd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

History

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/', 'name': 'FEDORA-2020-cd43b84c16', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ -

Information

Published : 2020-08-05 20:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-15113

Mitre link : CVE-2020-15113

CVE.ORG link : CVE-2020-15113


JSON object : View

Products Affected

fedoraproject

  • fedora

etcd

  • etcd
CWE
CWE-281

Improper Preservation of Permissions