A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
{ "binaries": [ { "binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2", "binary_name": "etcd" }, { "binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2", "binary_name": "etcd-client" }, { "binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2", "binary_name": "etcd-server" }, { "binary_version": "3.3.25+dfsg-7ubuntu0.22.04.2", "binary_name": "golang-etcd-server-dev" } ] }
{ "binaries": [ { "binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2", "binary_name": "etcd" }, { "binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2", "binary_name": "etcd-client" }, { "binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2", "binary_name": "etcd-server" }, { "binary_version": "3.2.17+dfsg-1ubuntu0.1+esm2", "binary_name": "golang-etcd-server-dev" } ] }
{ "binaries": [ { "binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1", "binary_name": "etcd" }, { "binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1", "binary_name": "etcd-client" }, { "binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1", "binary_name": "etcd-server" }, { "binary_version": "3.2.26+dfsg-6ubuntu0.2+esm1", "binary_name": "golang-etcd-server-dev" } ] }