Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
etcd: Authorization bypasses in multiple APIs
Vulnerability Description
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or partially trusted clients. In unpatched etcd clusters with etcd auth enabled, unauthorized users are able to call MemberList and learn cluster topology, including member IDs and advertised endpoints; call Alarm, which can be abused for operational disruption or denial of service; use Lease APIs, interfering with TTL-based keys and lease ownership; and/or trigger compaction, permanently removing historical revisions and disrupting watch, audit, and recovery workflows. Kubernetes does not rely on etcd’s built-in authentication and authorization. Instead, the API server handles authentication and authorization itself, so typical Kubernetes deployments are not affected. Versions 3.4.42, 3.5.28, and 3.6.9 contain a patch. If upgrading is not immediately possible, reduce exposure by treating the affected RPCs as unauthenticated in practice. Restrict network access to etcd server ports so only trusted components can connect and/or require strong client identity at the transport layer, such as mTLS with tightly scoped client certificate distribution.
CVSS Information
N/A
Vulnerability Type
授权机制缺失
Vulnerability Title
etcd 安全漏洞
Vulnerability Description
etcd是etcd-io开源的一套使用Go语言编写的用于分布式系统的键值存储系统。 etcd 3.4.42之前版本、3.5.28之前版本和3.6.9之前版本存在安全漏洞,该漏洞源于未经授权的用户可绕过身份验证或授权检查,可能导致信息泄露、拒绝服务和数据操作。
CVSS Information
N/A
Vulnerability Type
N/A