Description
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0838 | A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send. |
Github GHSA |
GHSA-5gjm-fj42-x983 | etcd Cross-site Request Forgery (CSRF) |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T03:51:48.502Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1098
No data.
Status : Modified
Published: 2018-04-03T16:29:00.237
Modified: 2024-11-21T03:59:10.670
Link: CVE-2018-1098
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA