CVE-2020-15113: Improper Preservation of Permissions
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
References
- github.com/advisories/GHSA-chh6-ppwq-jh92
- github.com/etcd-io/etcd/commit/6be5c54c94298ae6746a574d2af8227d0c9a998b
- github.com/etcd-io/etcd/commit/e5424fc474b274c9e6b5205165015bc2035745f2
- github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/
- nvd.nist.gov/vuln/detail/CVE-2020-15113
Detect and mitigate CVE-2020-15113 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →