GHSA-528j-9r78-wffx

Suggest an improvement
Source
https://github.com/advisories/GHSA-528j-9r78-wffx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-528j-9r78-wffx/GHSA-528j-9r78-wffx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-528j-9r78-wffx
Published
2022-10-06T23:17:24Z
Modified
2023-03-30T14:46:31Z
Summary
etcd user credentials are stored in WAL logs in plaintext
Details

Vulnerability type

Data Exposure

Workarounds

The etcd assumes that the on disk files are secure. The possible fixes have been provided, however, it is the responsibility of the etcd users to make sure that the etcd server WAL log files are secure. The etcd doesn't encrypt key/value data stored on disk drives.

Detail

User credentials (login and password) are stored in WAL entries on each user authentication. If the WAL log files are not secure, it can potentially expose sensitive information.

References

Find out more on this vulnerability in the security audit report

For more information

If you have any questions or comments about this advisory: * Contact the etcd security committee

References

Affected packages

Go / go.etcd.io/etcd/client/v3

Package

Name
go.etcd.io/etcd/client/v3
View open source insights on deps.dev
Purl
pkg:golang/go.etcd.io/etcd/client/v3

Affected ranges

Type
SEMVER
Events
Introduced
3.4.0
Fixed
3.4.10

Go / go.etcd.io/etcd/client/v3

Package

Name
go.etcd.io/etcd/client/v3
View open source insights on deps.dev
Purl
pkg:golang/go.etcd.io/etcd/client/v3

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
3.3.23