// For flags

CVE-2024-23451

Elasticsearch Incorrect Authorization in the Remote Cluster Security API key based security model

Severity Score

4.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue.

Existe un problema de autorización incorrecta en el modelo de seguridad basado en clave API para la seguridad de clúster remoto, que actualmente se encuentra en versión Beta, en Elasticsearch 8.10.0 y antes de 8.13.0. Esto permite que un usuario malintencionado con una clave API válida para un clúster remoto configurado para usar la nueva Seguridad de clúster remoto lea documentos arbitrarios de cualquier índice en el clúster remoto, y solo si utilizan el protocolo de transporte personalizado de Elasticsearch para emitir solicitudes con el ID del índice de destino, el ID del fragmento y el ID del documento. Ninguno de los endpoints de la API REST de Elasticsearch se ve afectado por este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-01-16 CVE Reserved
  • 2024-03-27 CVE Published
  • 2024-03-28 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-863: Incorrect Authorization
CAPEC
  • CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elastic
Search vendor "Elastic"
Elasticsearch
Search vendor "Elastic" for product "Elasticsearch"
>= 8.10.0 < 8.13.0
Search vendor "Elastic" for product "Elasticsearch" and version " >= 8.10.0 < 8.13.0"
en
Affected