UBUNTU-CVE-2021-22134

Source
https://ubuntu.com/security/CVE-2021-22134
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-22134.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-22134
Upstream
Published
2021-03-08T21:15:00Z
Modified
2025-07-16T08:15:30.380370Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.

References

Affected packages

Ubuntu:Pro:16.04:LTS / elasticsearch

Package

Name
elasticsearch
Purl
pkg:deb/ubuntu/elasticsearch@1.7.3+dfsg-3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6.2+dfsg-1
1.7.3+dfsg-1
1.7.3+dfsg-2
1.7.3+dfsg-3