{"id":"CVE-2020-15113","details":"In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).","aliases":["BIT-etcd-2020-15113","GHSA-chh6-ppwq-jh92"],"modified":"2026-04-10T04:22:48.275972Z","published":"2020-08-05T20:15:14.647Z","related":["CGA-rm48-c4rx-q7xp","GHSA-chh6-ppwq-jh92"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/"},{"type":"ADVISORY","url":"https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/etcd-io/etcd","events":[{"introduced":"0"},{"fixed":"4873f5516bd98c82dddb81247038337f25abac4e"},{"introduced":"898bd1351fcf6e0ebce8d7c8bbbbf3f3e42aa42c"},{"fixed":"18dfb9cca345bb2b2fbe73d5fc31028c2477bef1"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.3.23"},{"introduced":"3.4.0"},{"fixed":"3.4.10"}]}}],"versions":["0","v0.1.0","v0.1.1","v0.1.2","v0.2.0","v0.2.0-rc1","v0.2.0-rc2","v0.2.0-rc3","v0.2.0-rc4","v0.3.0","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.4.4","v0.4.5","v0.4.6","v0.5.0-alpha.0","v0.5.0-alpha.1","v0.5.0-alpha.2","v0.5.0-alpha.3","v0.5.0-alpha.4","v0.5.0-alpha.5","v2.0.0","v2.0.0-rc.1","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.1.0","v2.1.0-alpha.0","v2.1.0-alpha.1","v2.1.0-rc.0","v2.1.1","v2.2.0","v2.2.0-alpha.0","v2.2.0-alpha.1","v2.2.0-rc.0","v2.3.0","v2.3.0-alpha.0","v2.3.0-alpha.1","v3.0.0-beta.0","v3.1.0-alpha.0","v3.1.0-alpha.1","v3.1.0-rc.0","v3.1.0-rc.1","v3.2.0+git","v3.2.0-rc.0","v3.2.0-rc.1","v3.2.0_plus_git","v3.2.10_plus_git","v3.3.0","v3.3.0-rc.0","v3.3.0-rc.1","v3.3.0-rc.2","v3.3.0-rc.3","v3.3.0-rc.4","v3.3.1","v3.3.10","v3.3.11","v3.3.12","v3.3.13","v3.3.14","v3.3.14-beta.0","v3.3.14-rc.0","v3.3.15","v3.3.16","v3.3.17","v3.3.18","v3.3.19","v3.3.2","v3.3.20","v3.3.21","v3.3.22","v3.3.3","v3.3.4","v3.3.5","v3.3.6","v3.3.7","v3.3.8","v3.3.9","v3.4.0","v3.4.1","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v3.4.6","v3.4.7","v3.4.8","v3.4.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15113.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"32"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}