3.6
CVSSv2

CVE-2020-15113

Published: 05/08/2020 Updated: 07/11/2023
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
VMScore: 321
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

In etcd prior to 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

etcd etcd

fedoraproject fedora 32

Vendor Advisories

Debian Bug report logs - #968740 CVE-2020-15106 CVE-2020-15112 CVE-2020-15113 CVE-2020-15114 CVE-2020-15115 Package: etcd; Maintainer for etcd is Debian Go Packaging Team <team+pkg-go@trackerdebianorg>; Source for etcd is src:etcd (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 20 ...
Several security issues were fixed in etcd ...