Skip to content

etcd user credentials are stored in WAL logs in plaintext

Low severity GitHub Reviewed Published Aug 5, 2020 in etcd-io/etcd • Updated Mar 30, 2023

Package

gomod go.etcd.io/etcd/client/v3 (Go)

Affected versions

>= 3.4.0, < 3.4.10
< 3.3.23

Patched versions

3.4.10
3.3.23

Description

Vulnerability type

Data Exposure

Workarounds

The etcd assumes that the on disk files are secure. The possible fixes have been provided, however, it is the responsibility of the etcd users to make sure that the etcd server WAL log files are secure. The etcd doesn't encrypt key/value data stored on disk drives.

Detail

User credentials (login and password) are stored in WAL entries on each user authentication. If the WAL log files are not secure, it can potentially expose sensitive information.

References

Find out more on this vulnerability in the security audit report

For more information

If you have any questions or comments about this advisory:

References

@spzala spzala published to etcd-io/etcd Aug 5, 2020
Published to the GitHub Advisory Database Oct 6, 2022
Reviewed Oct 6, 2022
Last updated Mar 30, 2023

Severity

Low

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-528j-9r78-wffx

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.