etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
References
Link | Resource |
---|---|
https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ | Mailing List Third Party Advisory |
Information
Published : 2020-08-06 15:15
Updated : 2022-11-21 12:36
NVD link : CVE-2020-15115
Mitre link : CVE-2020-15115
JSON object : View
CWE
CWE-521
Weak Password Requirements
Products Affected
redhat
- etcd
fedoraproject
- fedora