CVE-2023-45807

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45807
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45807.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45807
Aliases
Related
Published
2023-10-16T22:15:12Z
Modified
2024-09-03T04:34:54.227336Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
[none]
Details

OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.

References

Affected packages

Git / github.com/opensearch-project/anomaly-detection

Affected ranges

Type
GIT
Repo
https://github.com/opensearch-project/anomaly-detection
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/opensearch-project/security
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

(None)

1.*

1.0.0.0
1.0.0.0-beta1
1.0.0.0-rc1
1.1.0.0
1.3.0.0
1.3.1.0
1.3.10.0
1.3.11.0
1.3.12.0
1.3.13.0
1.3.2.0
1.3.3.0
1.3.4.0
1.3.5.0
1.3.6.0
1.3.7.0
1.3.8.0
1.3.9.0

v0.*

v0.7.0.0
v0.7.0.1
v0.8.0.0
v0.9.0.0

v1.*

v1.0.0.0
v1.0.0.0-beta1
v1.0.0.0-beta1-rc1
v1.0.0.0-beta1-rc2
v1.0.0.0-beta1-rc3
v1.0.0.0-rc1
v1.0.1.0-OS-rc1
v1.1.0.0
v1.10.0.0
v1.10.0.0-rc1
v1.10.1.0
v1.10.1.0-rc1
v1.10.1.0-rc2
v1.11.0.0
v1.11.0.0-rc1
v1.12.0.0
v1.12.0.0-rc
v1.13.0.0
v1.13.0.0-rc1
v1.13.0.0-rc2
v1.13.0.0-rc3
v1.13.0.0-rc4
v1.13.1.0
v1.13.1.0-rc1
v1.13.1.0-rc2
v1.2.1-alpha
v1.3.0.0
v1.4.0.0
v1.5.0.0
v1.5.0.1
v1.6.0.0
v1.7.0.0
v1.8.0.0
v1.9.0.0
v1.9.0.0-rc1
v1.9.0.0-rc2
v1.9.0.1