Vulnerability Details CVE-2018-1098
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 49.3%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.8
Products affected by CVE-2018-1098
-
cpe:2.3:a:redhat:etcd:0.1.0
-
cpe:2.3:a:redhat:etcd:0.1.1
-
cpe:2.3:a:redhat:etcd:0.1.2
-
cpe:2.3:a:redhat:etcd:0.2.0
-
cpe:2.3:a:redhat:etcd:0.3.0
-
cpe:2.3:a:redhat:etcd:0.4.0
-
cpe:2.3:a:redhat:etcd:0.4.1
-
cpe:2.3:a:redhat:etcd:0.4.2
-
cpe:2.3:a:redhat:etcd:0.4.3
-
cpe:2.3:a:redhat:etcd:0.4.4
-
cpe:2.3:a:redhat:etcd:0.4.5
-
cpe:2.3:a:redhat:etcd:0.4.6
-
cpe:2.3:a:redhat:etcd:0.4.7
-
cpe:2.3:a:redhat:etcd:0.4.8
-
cpe:2.3:a:redhat:etcd:0.4.9
-
cpe:2.3:a:redhat:etcd:0.5.0
-
cpe:2.3:a:redhat:etcd:2.0.0
-
cpe:2.3:a:redhat:etcd:2.0.1
-
cpe:2.3:a:redhat:etcd:2.0.10
-
cpe:2.3:a:redhat:etcd:2.0.11
-
cpe:2.3:a:redhat:etcd:2.0.12
-
cpe:2.3:a:redhat:etcd:2.0.13
-
cpe:2.3:a:redhat:etcd:2.0.2
-
cpe:2.3:a:redhat:etcd:2.0.3
-
cpe:2.3:a:redhat:etcd:2.0.4
-
cpe:2.3:a:redhat:etcd:2.0.5
-
cpe:2.3:a:redhat:etcd:2.0.6
-
cpe:2.3:a:redhat:etcd:2.0.7
-
cpe:2.3:a:redhat:etcd:2.0.8
-
cpe:2.3:a:redhat:etcd:2.0.9
-
cpe:2.3:a:redhat:etcd:2.1.0
-
cpe:2.3:a:redhat:etcd:2.1.1
-
cpe:2.3:a:redhat:etcd:2.1.2
-
cpe:2.3:a:redhat:etcd:2.1.3
-
cpe:2.3:a:redhat:etcd:2.2.0
-
cpe:2.3:a:redhat:etcd:2.2.1
-
cpe:2.3:a:redhat:etcd:2.2.2
-
cpe:2.3:a:redhat:etcd:2.2.3
-
cpe:2.3:a:redhat:etcd:2.2.4
-
cpe:2.3:a:redhat:etcd:2.2.5
-
cpe:2.3:a:redhat:etcd:2.3.0
-
cpe:2.3:a:redhat:etcd:2.3.1
-
cpe:2.3:a:redhat:etcd:2.3.2
-
cpe:2.3:a:redhat:etcd:2.3.3
-
cpe:2.3:a:redhat:etcd:2.3.4
-
cpe:2.3:a:redhat:etcd:2.3.5
-
cpe:2.3:a:redhat:etcd:2.3.6
-
cpe:2.3:a:redhat:etcd:2.3.7
-
cpe:2.3:a:redhat:etcd:2.3.8
-
cpe:2.3:a:redhat:etcd:3.0.0
-
cpe:2.3:a:redhat:etcd:3.0.1
-
cpe:2.3:a:redhat:etcd:3.0.10
-
cpe:2.3:a:redhat:etcd:3.0.11
-
cpe:2.3:a:redhat:etcd:3.0.12
-
cpe:2.3:a:redhat:etcd:3.0.13
-
cpe:2.3:a:redhat:etcd:3.0.14
-
cpe:2.3:a:redhat:etcd:3.0.15
-
cpe:2.3:a:redhat:etcd:3.0.16
-
cpe:2.3:a:redhat:etcd:3.0.17
-
cpe:2.3:a:redhat:etcd:3.0.2
-
cpe:2.3:a:redhat:etcd:3.0.3
-
cpe:2.3:a:redhat:etcd:3.0.4
-
cpe:2.3:a:redhat:etcd:3.0.5
-
cpe:2.3:a:redhat:etcd:3.0.6
-
cpe:2.3:a:redhat:etcd:3.0.7
-
cpe:2.3:a:redhat:etcd:3.0.8
-
cpe:2.3:a:redhat:etcd:3.0.9
-
cpe:2.3:a:redhat:etcd:3.1.0
-
cpe:2.3:a:redhat:etcd:3.1.1
-
cpe:2.3:a:redhat:etcd:3.1.10
-
cpe:2.3:a:redhat:etcd:3.1.11
-
cpe:2.3:a:redhat:etcd:3.1.12
-
cpe:2.3:a:redhat:etcd:3.1.13
-
cpe:2.3:a:redhat:etcd:3.1.14
-
cpe:2.3:a:redhat:etcd:3.1.2
-
cpe:2.3:a:redhat:etcd:3.1.3
-
cpe:2.3:a:redhat:etcd:3.1.4
-
cpe:2.3:a:redhat:etcd:3.1.5
-
cpe:2.3:a:redhat:etcd:3.1.6
-
cpe:2.3:a:redhat:etcd:3.1.7
-
cpe:2.3:a:redhat:etcd:3.1.8
-
cpe:2.3:a:redhat:etcd:3.1.9
-
cpe:2.3:a:redhat:etcd:3.2.0
-
cpe:2.3:a:redhat:etcd:3.2.1
-
cpe:2.3:a:redhat:etcd:3.2.10
-
cpe:2.3:a:redhat:etcd:3.2.11
-
cpe:2.3:a:redhat:etcd:3.2.12
-
cpe:2.3:a:redhat:etcd:3.2.13
-
cpe:2.3:a:redhat:etcd:3.2.14
-
cpe:2.3:a:redhat:etcd:3.2.15
-
cpe:2.3:a:redhat:etcd:3.2.16
-
cpe:2.3:a:redhat:etcd:3.2.17
-
cpe:2.3:a:redhat:etcd:3.2.18
-
cpe:2.3:a:redhat:etcd:3.2.19
-
cpe:2.3:a:redhat:etcd:3.2.2
-
cpe:2.3:a:redhat:etcd:3.2.3
-
cpe:2.3:a:redhat:etcd:3.2.4
-
cpe:2.3:a:redhat:etcd:3.2.5
-
cpe:2.3:a:redhat:etcd:3.2.6
-
cpe:2.3:a:redhat:etcd:3.2.7
-
cpe:2.3:a:redhat:etcd:3.2.8
-
cpe:2.3:a:redhat:etcd:3.2.9
-
cpe:2.3:a:redhat:etcd:3.3.0
-
cpe:2.3:a:redhat:etcd:3.3.1
-
cpe:2.3:o:fedoraproject:fedora:30