Vulnerability identifier: #VU50604
Vulnerability risk: Low
CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-532
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Elasticsearch
Web applications /
Other software
Vendor: Elastic Stack
Description
The vulnerability allows a remote administrator to gain access to sensitive information.
The vulnerability exists due to software stores sensitive information into log files, when audit logging and the emit_request_body option is enabled. The Elasticsearch administrator can view the audit log and obtain password hashes or authentication tokens in clear text.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Elasticsearch: 7.9.0 - 7.9.3, 7.8.0 - 7.8.1, 7.7.0 - 7.7.1, 7.6.0 - 7.6.2, 7.5.0 - 7.5.2, 7.4.0 - 7.4.2, 6.8.0 - 6.8.13, 6.7.0 - 6.7.2, 6.5.0 - 6.5.4, 6.4.0 - 6.4.3, 6.3.0 - 6.3.2, 6.2.0 - 6.2.4, 6.1.0 - 6.1.4, 6.0.0 - 6.0.1, 6.6.0 - 6.6.2, 7.3.0 - 7.3.2, 7.2.0 - 7.2.1, 7.0.0 - 7.0.1, 7.1.0 - 7.1.1
External links
http://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915
http://www.elastic.co/guide/en/elasticsearch/reference/6.8/release-notes-6.8.14.html#release-notes-6.8.14
http://www.elastic.co/community/security#ESA-2021-03
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.