// For flags

CVE-2023-23613

Field-level security issue with .keyword fields in OpenSearch

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.

OpenSearch es un motor de búsqueda RESTful y distribuido de código abierto. En las versiones afectadas hay un problema en la implementación de la seguridad a nivel de campo (FLS) y el enmascaramiento de campos donde las reglas escritas para excluir campos explícitamente no se aplican correctamente para ciertas consultas que dependen de sus campos .keyword generados automáticamente. Este problema solo está presente para usuarios autenticados con acceso de lectura a los índices que contienen los campos restringidos. Esto puede exponer datos a los que de otra manera el usuario no podría acceder. OpenSearch 1.0.0-1.3.7 y 2.0.0-2.4.1 se ven afectados. Se recomienda a los usuarios que actualicen a OpenSearch 1.3.8 o 2.5.0. Los usuarios que no puedan actualizar pueden escribir reglas de exclusión explícitas Como workaround. Las políticas creadas de esta manera no están sujetas a esta cuestión.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-01-16 CVE Reserved
  • 2023-01-24 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amazon
Search vendor "Amazon"
Opensearch
Search vendor "Amazon" for product "Opensearch"
>= 1.0.0 < 1.3.8
Search vendor "Amazon" for product "Opensearch" and version " >= 1.0.0 < 1.3.8"
-
Affected
Amazon
Search vendor "Amazon"
Opensearch
Search vendor "Amazon" for product "Opensearch"
>= 2.0.0 < 2.5.0
Search vendor "Amazon" for product "Opensearch" and version " >= 2.0.0 < 2.5.0"
-
Affected