Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-7611

Опубликовано: 19 фев. 2019
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index.

Отчет

Red Hat OpenStack Platform 8.0/9.0 Operational Tools Kibana/Elasticsearch versions do not include nor support X-Pack (8/9 versions must use the optional Shield, also not packaged); not affected. OpenShift Container Platform (OCP) does not include X-Pack with Elasticsearch, which prevents this vulnerability from being exploited. However, versions of Elasticsearch shipped in OCP do contain the vulnerable code which could allow this vulnerability to be exploited if X-Pack was installed.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7elasticsearchNot affected
Red Hat JBoss Fuse 6elasticsearchOut of support scope
Red Hat OpenShift Container Platform 3.10elasticsearchWill not fix
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-elasticsearch5Will not fix
Red Hat OpenShift Container Platform 3.2elasticsearchOut of support scope
Red Hat OpenShift Container Platform 3.3elasticsearchOut of support scope
Red Hat OpenShift Container Platform 3.4elasticsearchOut of support scope
Red Hat OpenShift Container Platform 3.5elasticsearchOut of support scope
Red Hat OpenShift Container Platform 3.6elasticsearchOut of support scope
Red Hat OpenShift Container Platform 3.7elasticsearchOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=1696034elasticsearch: Improper permission issue when attaching a new name to an index

EPSS

Процентиль: 72%
0.00713
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 7 лет назад

A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index.

CVSS3: 8.1
nvd
почти 7 лет назад

A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index.

CVSS3: 8.1
debian
почти 7 лет назад

A permission issue was found in Elasticsearch versions before 5.6.15 a ...

CVSS3: 8.1
github
больше 3 лет назад

Improper Access Control in Elasticsearch

EPSS

Процентиль: 72%
0.00713
Низкий

6.8 Medium

CVSS3