CVE-2023-23613 – org.opensearch.plugin:opensearch-security
Package
Manager: maven
Name: org.opensearch.plugin:opensearch-security
Vulnerable Version: >=0 <1.3.8 || >=2.0.0 <2.5.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00157 pctl0.37063
Details
Field-level security issue with .keyword fields in OpenSearch ### Advisory title: Field-level security issue with .keyword fields ### Affected versions: OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 ### Patched versions: OpenSearch 1.3.8 and 2.5.0 ### Impact: There is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. ### Workaround: FLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue. ### Patches: OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue. ### For more information: If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.
Metadata
Created: 2023-01-24T20:54:28Z
Modified: 2025-01-16T14:06:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-v3cg-7r9h-r2g6/GHSA-v3cg-7r9h-r2g6.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-v3cg-7r9h-r2g6
Finding: F038
Auto approve: 1