GHSA-hwvv-438r-mhvj

Suggest an improvement
Source
https://github.com/advisories/GHSA-hwvv-438r-mhvj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-hwvv-438r-mhvj/GHSA-hwvv-438r-mhvj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hwvv-438r-mhvj
Aliases
Published
2021-03-18T19:23:57Z
Modified
2024-02-22T05:33:10.808612Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Exposure of Sensitive Information to an Unauthorized Actor
Details

A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.

Database specific
{
    "nvd_published_at": "2021-03-08T21:15:00Z",
    "cwe_ids": [
        "CWE-200",
        "CWE-863"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-03-12T21:17:57Z"
}
References

Affected packages

Maven / org.elasticsearch:elasticsearch

Package

Name
org.elasticsearch:elasticsearch
View open source insights on deps.dev
Purl
pkg:maven/org.elasticsearch/elasticsearch

Affected ranges

Type
ECOSYSTEM
Events
Introduced
7.6.0
Fixed
7.11.0

Affected versions

7.*

7.6.0
7.6.1
7.6.2
7.7.0
7.7.1
7.8.0
7.8.1
7.9.0
7.9.1
7.9.2
7.9.3
7.10.0
7.10.1
7.10.2