-
CVSS Score
-The vulnerability stemmed from the Authenticate method in v3_server.go including the user's plaintext password in the InternalAuthenticateRequest struct, which was then written to WAL logs. The security fix (commit 5858140) explicitly removes the Password field from this struct construction, confirming this was the entry point for plaintext credential exposure. The function's role in processing authentication requests and its direct modification in the patch establish it as the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| go.etcd.io/etcd/client/v3 | go | >= 3.4.0, < 3.4.10 | 3.4.10 |
| go.etcd.io/etcd/client/v3 | go | < 3.3.23 | 3.3.23 |
A Semantic Attack on Google Gemini - Read the Latest Research