Page 2 of 7 results (0.001 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 it was discovered that a user could scale out allocators on new hosts with an invalid roles token. An attacker with access to the previous runner ID and IP address of the coordinator-host could add a allocator to an existing ECE install to gain access to other clusters data. En Elastic Cloud Enterprise (ECE) en versiones anteriores a la 1.1.4, se ha descubierto que un usuario podría sacar de su escala los asignadores en nuevos hosts con un token de roles no válido. Un atacante con acceso al ID runner anterior y a la dirección IP del coordinador-host podría añadir un asignador a una instalación ECE existente para obtener acceso a otros datos de clústers. • https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778 https://www.elastic.co/community/security • CWE-285: Improper Authorization CWE-290: Authentication Bypass by Spoofing •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 contain an information exposure vulnerability. It was discovered that certain exception conditions would result in encryption keys, passwords, and other security sensitive headers being leaked to the allocator logs. An attacker with access to the logging cluster may obtain leaked credentials and perform authenticated actions using these credentials. Elastic Cloud Enterprise (ECE), en versiones anteriores a la 1.1.4, contiene una vulnerabilidad de exposición de información. Se ha descubierto que determinadas condiciones de excepción resultarían en la fuga de claves cifradas, contraseñas y otras cabeceras de seguridad sensibles a los logs del "allocator". • https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778 https://www.elastic.co/community/security • CWE-532: Insertion of Sensitive Information into Log File •