CVE-2023-31418 – org.elasticsearch:elasticsearch
Package
Manager: maven
Name: org.elasticsearch:elasticsearch
Vulnerable Version: >=0 <7.17.13 || >=8.0.0 <8.9.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00625 pctl0.69275
Details
Elasticsearch vulnerable to Uncontrolled Resource Consumption An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elastic Engineering and we have no indication that the issue is known or that it is being exploited in the wild.
Metadata
Created: 2023-10-26T18:30:23Z
Modified: 2023-10-30T15:10:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-2cqf-6xv9-f22w/GHSA-2cqf-6xv9-f22w.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-2cqf-6xv9-f22w
Finding: F067
Auto approve: 1