// For flags

CVE-2024-23445

Elasticsearch Remote Cluster Search Cross Cluster API Key insufficient restrictions

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

It was identified that if a cross-cluster API key https://www.elastic.co/guide/en/elasticsearch/reference/8.14/security-api-create-cross-cluster-api-key.html#security-api-create-cross-cluster-api-key-request-body  restricts search for a given index using the query or the field_security parameter, and the same cross-cluster API key also grants replication for the same index, the search restrictions are not enforced during cross cluster search operations and search results may include documents and terms that should not be returned.

This issue only affects the API key based security model for remote clusters https://www.elastic.co/guide/en/elasticsearch/reference/8.14/remote-clusters.html#remote-clusters-security-models  that was previously a beta feature and is released as GA with 8.14.0

Se identificó que si se utiliza una clave API entre clústeres https://www.elastic.co/guide/en/elasticsearch/reference/8.14/security-api-create-cross-cluster-api-key.html#security-api -create-cross-cluster-api-key-request-body restringe la búsqueda de un índice determinado utilizando la consulta o el parámetro field_security, y la misma clave API entre clústeres también otorga replicación para el mismo índice, las restricciones de búsqueda no se aplican durante las operaciones de búsqueda entre grupos y los resultados de la búsqueda pueden incluir documentos y términos que no deben devolverse. Este problema solo afecta el modelo de seguridad basado en clave API para clústeres remotos https://www.elastic.co/guide/en/elasticsearch/reference/8.14/remote-clusters.html#remote-clusters-security-models que anteriormente era un función beta y se lanza como GA con 8.14.0

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-01-16 CVE Reserved
  • 2024-06-12 CVE Published
  • 2024-06-13 EPSS Updated
  • 2024-10-31 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-922: Insecure Storage of Sensitive Information
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elastic
Search vendor "Elastic"
Elasticsearch
Search vendor "Elastic" for product "Elasticsearch"
>= 8.10.0 < 8.14.0
Search vendor "Elastic" for product "Elasticsearch" and version " >= 8.10.0 < 8.14.0"
en
Affected