GHSA-q394-h7f5-7f44

Suggest an improvement
Source
https://github.com/advisories/GHSA-q394-h7f5-7f44
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q394-h7f5-7f44/GHSA-q394-h7f5-7f44.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q394-h7f5-7f44
Aliases
Published
2022-05-24T19:08:49Z
Modified
2024-02-21T05:32:59.400580Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Generation of Error Message Containing Sensitive Information in Elasticsearch
Details

A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details.

Database specific
{
    "nvd_published_at": "2021-07-21T15:15:00Z",
    "cwe_ids": [
        "CWE-209"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-06-22T18:23:29Z"
}
References

Affected packages

Maven / org.elasticsearch.client:elasticsearch-rest-client

Package

Name
org.elasticsearch.client:elasticsearch-rest-client
View open source insights on deps.dev
Purl
pkg:maven/org.elasticsearch.client/elasticsearch-rest-client

Affected ranges

Type
ECOSYSTEM
Events
Introduced
7.10.0
Fixed
7.13.4

Affected versions

7.*

7.10.0
7.10.1
7.10.2
7.11.0
7.11.1
7.11.2
7.12.0
7.12.1
7.13.0
7.13.1
7.13.2
7.13.3

Database specific

{
    "last_known_affected_version_range": "<= 7.13.3"
}