Skip to content

Improper Access Control in Elasticsearch

High severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

maven org.elasticsearch:elasticsearch (Maven)

Affected versions

< 5.6.15
>= 6.0.0, < 6.6.1

Patched versions

5.6.15
6.6.1

Description

A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index.

References

Published by the National Vulnerability Database Mar 25, 2019
Published to the GitHub Advisory Database May 13, 2022
Reviewed Jun 27, 2022
Last updated Jan 27, 2023

Severity

High
8.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2019-7611

GHSA ID

GHSA-fj32-6v7m-57pg

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.