A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product generates an error message that includes sensitive information about its environment, users, or associated data.
Link | Tags |
---|---|
https://www.oracle.com/security-alerts/cpuapr2022.html | patch third party advisory |
https://security.netapp.com/advisory/ntap-20210827-0006/ | third party advisory |
https://discuss.elastic.co/t/elasticsearch-7-13-4-security-update/279177 | vendor advisory |
http://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html | vdb entry exploit third party advisory |
https://gist.github.com/lucasdrufva/f9c5d7c9e26ee087b736d727953afd34 | technical description |