Description
Elasticsearch Security versions 6.4.0 to 6.4.2 contain an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms. A request may receive headers intended for another request if the same username is being authenticated concurrently; when used with run as, this can result in the request running as the incorrect user. This could allow a user to access information that they should not have access to.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5398 | Elasticsearch Security versions 6.4.0 to 6.4.2 contain an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms. A request may receive headers intended for another request if the same username is being authenticated concurrently; when used with run as, this can result in the request running as the incorrect user. This could allow a user to access information that they should not have access to. |
Github GHSA |
GHSA-vpqm-88c4-x4cv | Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch |
References
History
No history.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-08-05T10:47:04.105Z
Reserved: 2018-09-20T00:00:00.000Z
Link: CVE-2018-17244
No data.
Status : Modified
Published: 2018-12-20T22:29:00.240
Modified: 2024-11-21T03:54:09.017
Link: CVE-2018-17244
OpenCVE Enrichment
No data.
EUVD
Github GHSA