6.8
CVSSv2

CVE-2018-1098

Published: 03/04/2018 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A cross-site request forgery flaw was found in etcd 3.3.1 and previous versions. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat etcd

fedoraproject fedora 30

Vendor Advisories

Debian Bug report logs - #921156 etcd: CVE-2018-1098 CVE-2018-1099 Package: src:etcd; Maintainer for src:etcd is Debian Go Packaging Team <team+pkg-go@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 2 Feb 2019 12:51:06 UTC Severity: important Tags: fixed-upstream, security, upst ...
A cross-site request forgery flaw has been discovered in etcd A remote attacker could set up a malicious website that execute POST requests to an etcd server to modify or add a key ...