A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
{
"binaries": [
{
"binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2",
"binary_name": "etcd"
},
{
"binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2",
"binary_name": "etcd-client"
},
{
"binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2",
"binary_name": "etcd-server"
},
{
"binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2",
"binary_name": "golang-etcd-server-dev"
}
]
}{
"binaries": [
{
"binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1",
"binary_name": "etcd"
},
{
"binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1",
"binary_name": "etcd-client"
},
{
"binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1",
"binary_name": "etcd-server"
},
{
"binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1",
"binary_name": "golang-etcd-server-dev"
}
]
}{
"binaries": [
{
"binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2+esm2",
"binary_name": "etcd"
},
{
"binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2+esm2",
"binary_name": "etcd-client"
},
{
"binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2+esm2",
"binary_name": "etcd-server"
},
{
"binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2+esm2",
"binary_name": "golang-etcd-server-dev"
}
]
}{
"binaries": [
{
"binary_version": "3.4.30-1ubuntu0.24.04.3+esm1",
"binary_name": "etcd-client"
},
{
"binary_version": "3.4.30-1ubuntu0.24.04.3+esm1",
"binary_name": "etcd-server"
},
{
"binary_version": "3.4.30-1ubuntu0.24.04.3+esm1",
"binary_name": "golang-etcd-server-dev"
}
]
}