First published: Wed Mar 07 2018(Updated: )
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/go.etcd.io/etcd/v3 | <3.4.0 | 3.4.0 |
etcd | <=3.3.1 | |
Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1098 is classified as a high severity cross-site request forgery vulnerability.
To remediate CVE-2018-1098, upgrade etcd to version 3.4.0 or later.
CVE-2018-1098 affects etcd versions 3.3.1 and earlier.
CVE-2018-1098 is a cross-site request forgery flaw that allows attackers to send unauthorized requests.
Yes, an attacker can exploit CVE-2018-1098 remotely by creating a malicious website to send POST requests to the etcd server.