Page 2 of 12 results (0.037 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details. Las versiones de Elasticsearch versiones anteriores a 7.10.0 y 6.8.14, presentan un problema de divulgación de información cuando se habilita el registro de auditoría y la opción emit_request_body. El registro de auditoría de Elasticsearch podría contener información confidencial como un hash de contraseña o tokens de autenticación. • https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915 https://security.netapp.com/advisory/ntap-20210319-0003 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 3.5EPSS: 0%CPEs: 2EXPL: 0

Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices. Elasticsearch versiones anteriores a 6.8.13 y 7.9.2, contienen un fallo de divulgación de documentos cuando es usado Document o Field Level Security. • https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033 https://security.netapp.com/advisory/ntap-20201123-0001 https://staging-website.elastic.co/community/security https://access.redhat.com/security/cve/CVE-2020-7020 https://bugzilla.redhat.com/show_bug.cgi?id=1893125 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-269: Improper Privilege Management CWE-270: Privilege Context Switching Error •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

In Elasticsearch before 7.9.0 and 6.8.12 a field disclosure flaw was found when running a scrolling search with Field Level Security. If a user runs the same query another more privileged user recently ran, the scrolling search can leak fields that should be hidden. This could result in an attacker gaining additional permissions against a restricted index. En Elasticsearch versiones anteriores a 7.9.0 y 6.8.12, se encontró un fallo de divulgación de campo al ejecutar una búsqueda de desplazamiento con Field Level Security. Si un usuario ejecuta la misma consulta que otro usuario más privilegiado realizó recientemente, la búsqueda de desplazamiento puede filtrar campos que deberían estar ocultos. • https://discuss.elastic.co/t/elastic-stack-7-9-0-and-6-8-12-security-update/245456 https://security.netapp.com/advisory/ntap-20200827-0001 • CWE-269: Improper Privilege Management CWE-270: Privilege Context Switching Error •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

A race condition flaw was found in the response headers Elasticsearch versions before 7.2.1 and 6.8.2 returns to a request. On a system with multiple users submitting requests, it could be possible for an attacker to gain access to response header containing sensitive data from another user. Se detectó un fallo de condición de carrera en los encabezados de respuesta que devuelve una petición de Elasticsearch versiones anteriores a 7.2.1 y 6.8.2. Sobre un sistema con múltiples usuarios que envían peticiones, un atacante podría conseguir acceso al encabezado de respuesta que contiene datos confidenciales de otro usuario. • https://www.elastic.co/community/security • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index. Se ha encontrado un problema de permiso en versiones anteriores a las 5.6.15 y 6.6.1 de Elasticsearch cuando se encuentran deshabilitados Field Level Security y Document Level Security, y se utilizan los endpoints _aliases, _shrink o _split. Si el archivo elasticsearch.yml tiene la opción xpack.security.dls_fls.enabled configurada en ‘‘false’’, se omiten ciertas comprobaciones de permiso cuando los usuarios ejecutan una de las acciones mencionadas anteriormente, para hacer que los datos existentes sean disponibles bajo un nuevo alias o nombre de índice. • https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 https://www.elastic.co/community/security https://access.redhat.com/security/cve/CVE-2019-7611 https://bugzilla.redhat.com/show_bug.cgi?id=1696034 • CWE-284: Improper Access Control CWE-285: Improper Authorization •