// For flags

CVE-2022-35980

OpenSearch vulnerable to Improper Authorization of Index Containing Sensitive Information

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

OpenSearch Security is a plugin for OpenSearch that offers encryption, authentication and authorization. Versions 2.0.0.0 and 2.1.0.0 of the security plugin are affected by an information disclosure vulnerability. Requests to an OpenSearch cluster configured with advanced access control features document level security (DLS), field level security (FLS), and/or field masking will not be filtered when the query's search pattern matches an aliased index. OpenSearch Dashboards creates an alias to `.kibana` by default, so filters with the index pattern of `*` to restrict access to documents or fields will not be applied. This issue allows requests to access sensitive information when customer have acted to restrict access that specific information. OpenSearch 2.2.0, which is compatible with OpenSearch Security 2.2.0.0, contains the fix for this issue. There is no recommended work around.

OpenSearch Security es un plugin para OpenSearch que ofrece cifrado, autenticación y autorización. Las versiones 2.0.0.0 y 2.1.0.0 del plugin de seguridad están afectadas por una vulnerabilidad de divulgación de información. Las peticiones a un clúster de OpenSearch configurado con las funciones de control de acceso avanzado de seguridad a nivel de documento (DLS), seguridad a nivel de campo (FLS) y/o enmascaramiento de campos no son filtradas cuando el patrón de búsqueda de la consulta coincida con un índice de alias. OpenSearch Dashboards crea un alias a ".kibana" por defecto, por lo que los filtros con el patrón de índice de "*" para restringir el acceso a documentos o campos no serán aplicados. Este problema permite que las peticiones accedan a información confidencial cuando el cliente ha actuado para restringir el acceso a esa información específica. OpenSearch versión 2.2.0, que es compatible con OpenSearch Security versión 2.2.0.0, contiene la corrección de este problema. No se presenta ninguna mitigación recomendada.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-15 CVE Reserved
  • 2022-08-12 CVE Published
  • 2024-03-04 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-612: Improper Authorization of Index Containing Sensitive Information
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amazon
Search vendor "Amazon"
Opensearch
Search vendor "Amazon" for product "Opensearch"
2.0.0
Search vendor "Amazon" for product "Opensearch" and version "2.0.0"
docker
Affected
Amazon
Search vendor "Amazon"
Opensearch
Search vendor "Amazon" for product "Opensearch"
2.1.0
Search vendor "Amazon" for product "Opensearch" and version "2.1.0"
docker
Affected