[DepShield] (CVSS 7.7) Vulnerability due to usage of github.com/coreos:etcd:3.3.10
sonatype-depshield opened this issue · comments
Vulnerabilities
DepShield reports that this application's usage of github.com/coreos:etcd:3.3.10 results in the following vulnerability(s):
- (CVSS 7.7) [CVE-2020-15114] In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP prox...
- (CVSS 6.5) [CVE-2020-15136] In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only ap...
- (CVSS 5.8) [CVE-2020-15115] etcd before versions 3.3.23 and 3.4.10 does not perform any password length vali...
Occurrences
github.com/coreos:etcd:3.3.10 is a transitive dependency introduced by the following direct dependency(s):
• github.com/spf13:cobra:1.0.0
└─ github.com/spf13:viper:1.4.0
└─ github.com/coreos:etcd:3.3.10
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
@bhamail this is a false positive correct (since we replace this)?
Closing as false positive. The app actually uses a different version of etcd
than reported by go mod graph
, due to the replace
directive below:
// fix vulnerability: CVE-2020-15114 in etcd v3.3.13+incompatible
replace github.com/coreos/etcd => github.com/coreos/etcd v3.3.24+incompatible
$ go list -m all | grep etcd
github.com/coreos/etcd v3.3.13+incompatible => github.com/coreos/etcd v3.3.24+incompatible
go.etcd.io/bbolt v1.3.2