Vulnerability Description
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Etcd | Etcd | < 3.3.23 |
| Fedoraproject | Fedora | 32 |
Related Weaknesses (CWE)
References
- https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92Third Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92Third Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2020-15113?
CVE-2020-15113 is a vulnerability with a CVSS score of 5.7 (MEDIUM). In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS conn...
How severe is CVE-2020-15113?
CVE-2020-15113 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-15113?
Check the references section above for vendor advisories and patch information. Affected products include: Etcd Etcd, Fedoraproject Fedora.