CVE-2021-22145 – org.elasticsearch.client:elasticsearch-rest-client
Package
Manager: maven
Name: org.elasticsearch.client:elasticsearch-rest-client
Vulnerable Version: >=7.10.0 <7.13.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.59934 pctl0.98204
Details
Generation of Error Message Containing Sensitive Information in Elasticsearch A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details.
Metadata
Created: 2022-05-24T19:08:49Z
Modified: 2025-07-09T15:02:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q394-h7f5-7f44/GHSA-q394-h7f5-7f44.json
CWE IDs: ["CWE-200", "CWE-209"]
Alternative ID: GHSA-q394-h7f5-7f44
Finding: F037
Auto approve: 1