CVE-2023-23613
Field-level security issue with .keyword fields in OpenSearch
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.
OpenSearch es un motor de búsqueda RESTful y distribuido de código abierto. En las versiones afectadas hay un problema en la implementación de la seguridad a nivel de campo (FLS) y el enmascaramiento de campos donde las reglas escritas para excluir campos explícitamente no se aplican correctamente para ciertas consultas que dependen de sus campos .keyword generados automáticamente. Este problema solo está presente para usuarios autenticados con acceso de lectura a los índices que contienen los campos restringidos. Esto puede exponer datos a los que de otra manera el usuario no podría acceder. OpenSearch 1.0.0-1.3.7 y 2.0.0-2.4.1 se ven afectados. Se recomienda a los usuarios que actualicen a OpenSearch 1.3.8 o 2.5.0. Los usuarios que no puedan actualizar pueden escribir reglas de exclusión explícitas Como workaround. Las políticas creadas de esta manera no están sujetas a esta cuestión.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-01-16 CVE Reserved
- 2023-01-24 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0 | Third Party Advisory | |
https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Amazon Search vendor "Amazon" | Opensearch Search vendor "Amazon" for product "Opensearch" | >= 1.0.0 < 1.3.8 Search vendor "Amazon" for product "Opensearch" and version " >= 1.0.0 < 1.3.8" | - |
Affected
| ||||||
Amazon Search vendor "Amazon" | Opensearch Search vendor "Amazon" for product "Opensearch" | >= 2.0.0 < 2.5.0 Search vendor "Amazon" for product "Opensearch" and version " >= 2.0.0 < 2.5.0" | - |
Affected
|