logo

CVE-2018-3831 org.elasticsearch:elasticsearch

Package

Manager: maven
Name: org.elasticsearch:elasticsearch
Vulnerable Version: >=5.6.0 <5.6.12 || >=6.0.0 <6.4.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00828 pctl0.73634

Details

Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authenticated Elasticsearch user to improperly view these details.

Metadata

Created: 2022-05-13T01:27:27Z
Modified: 2022-06-28T23:46:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-r9fv-qpm9-rj4g/GHSA-r9fv-qpm9-rj4g.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-r9fv-qpm9-rj4g
Finding: F038
Auto approve: 1