Description
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-17389 | Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen. |
References
History
No history.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-08-05T16:34:22.961Z
Reserved: 2017-05-02T00:00:00.000Z
Link: CVE-2017-8438
No data.
Status : Modified
Published: 2017-06-05T14:29:00.280
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-8438
No data.
OpenCVE Enrichment
No data.
EUVD