blob: a9a0a1e7cd548b2d0fcb4552a829b52ca2204bf1 [file] [log] [blame]
{
"schema_version": "1.3.1",
"id": "GO-2021-0077",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2018-16886",
"GHSA-h6xx-pmxh-3wgp"
],
"summary": "Authentication bypass in go.etcd.io/etcd",
"details": "A user can use a valid client certificate that contains a CommonName that matches a valid RBAC username to authenticate themselves as that user, despite lacking the required credentials. This may allow authentication bypass, but requires a certificate that is issued by a CA trusted by the server.",
"affected": [
{
"package": {
"name": "go.etcd.io/etcd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.5.0-alpha.5.0.20190108173120-83c051b701d3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "go.etcd.io/etcd/auth",
"symbols": [
"authStore.AuthInfoFromTLS"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/etcd-io/etcd/pull/10366"
},
{
"type": "FIX",
"url": "https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0077"
}
}