org.elasticsearch:elasticsearch@0.14.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.elasticsearch:elasticsearch package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Missing Encryption of Sensitive Data

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Missing Encryption of Sensitive Data when creating a new Certificate Signing Request via the elasticsearch-certutil tool with the csr option. The private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.

How to fix Missing Encryption of Sensitive Data?

Upgrade org.elasticsearch:elasticsearch to version 7.17.23, 8.13.0 or higher.

[,7.17.23) [8.0.0-alpha1,8.13.0)
  • M
Uncontrolled Recursion

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Uncontrolled Recursion when processing a document in a deeply nested pipeline on an ingest node, causing the node to crash.

How to fix Uncontrolled Recursion?

Upgrade org.elasticsearch:elasticsearch to version 7.17.19, 8.13.0 or higher.

[,7.17.19) [8.0.0-alpha1,8.13.0)
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') when handling incoming requests on the HTTP layer. An attacker can force a node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests.

How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')?

Upgrade org.elasticsearch:elasticsearch to version 7.17.13, 8.9.0 or higher.

[,7.17.13) [8.0.0,8.9.0)
  • M
Cross-site Scripting (XSS)

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Data Preview Pane which could allow arbitrary JavaScript to be executed in a victim’s browser.

How to fix Cross-site Scripting (XSS)?

Upgrade org.elasticsearch:elasticsearch to version 7.17.1, 8.0.1 or higher.

[,7.17.1) [8.0.0,8.0.1)
  • L
Missing Authorization

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Missing Authorization by allowing users with Read access to the Uptime feature to modify alerting rules. That being said, any new or modified rules would not be enabled, and a user with this privilege could not modify alerting connectors.

How to fix Missing Authorization?

Upgrade org.elasticsearch:elasticsearch to version 7.17.1, 8.0.1 or higher.

[,7.17.1) [8.0.0,8.0.1)
  • M
Denial of Service (DoS)

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Denial of Service (DoS). An uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the {es} Grok parser. A user with the ability to submit arbitrary queries to {es} could create a malicious Grok query that will crash the {es} node.

How to fix Denial of Service (DoS)?

Upgrade org.elasticsearch:elasticsearch to version 7.13.3, 6.8.17 or higher.

[7.0.0,7.13.3) [,6.8.17)
  • M
Information Disclosure

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Information Disclosure. A document disclosure flaw was found in Elasticsearch when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in a search disclosing the existence of documents an authenticated user should not be able to view.

How to fix Information Disclosure?

Upgrade org.elasticsearch:elasticsearch to version 7.11.2, 6.8.15 or higher.

[7.0.0,7.11.2) [,6.8.15)
  • L
Information Disclosure

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Information Disclosure. A document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.

How to fix Information Disclosure?

Upgrade org.elasticsearch:elasticsearch to version 7.11.2, 6.8.15 or higher.

[7.0.0,7.11.2) [,6.8.15)
  • L
Information Disclosure

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Information Disclosure. There is an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details.

How to fix Information Disclosure?

Upgrade org.elasticsearch:elasticsearch to version 6.8.14, 7.10.0 or higher.

[,6.8.14) [7.0.0-alpha1,7.10.0)
  • L
Information Exposure

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Information Exposure. It contains a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.

How to fix Information Exposure?

Upgrade org.elasticsearch:elasticsearch to version 6.8.13, 7.9.2 or higher.

[0,6.8.13) [7.0.0,7.9.2)
  • M
Arbitrary Code Execution

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.

How to fix Arbitrary Code Execution?

Upgrade org.elasticsearch:elasticsearch to version 1.2.0 or higher.

[,1.2.0)
  • H
Privilege Escalation

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Privilege Escalation. A permission issue was found in Elasticsearch when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used .

If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index.

How to fix Privilege Escalation?

Upgrade org.elasticsearch:elasticsearch to version 5.6.15, 6.6.1 or higher.

[,5.6.15) [6.0.0,6.6.1)
  • M
Race Condition

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Race Condition. ‎On a system with multiple users submitting requests, it could be possible for an attacker to gain access to response header containing sensitive data from another user.

How to fix Race Condition?

Upgrade org.elasticsearch:elasticsearch to version 6.8.2, 7.2.1 or higher.

[,6.8.2) [7.0.0,7.2.1)
  • M
Cross-site Scripting (XSS)

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible for remote attackers to inject arbitrary web script or HTML via unspecified vectors.

How to fix Cross-site Scripting (XSS)?

Upgrade org.elasticsearch:elasticsearch to version 1.4.0.Beta1 or higher.

[,1.4.0.Beta1)
  • M
Directory Traversal

org.elasticsearch:elasticsearch Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.

[,1.4.5) [1.5.0,1.5.2)
  • C
Arbitrary Code Execution

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Elasticsearch versions prior to 1.6.1 are vulnerable to an engineered attack on its transport protocol that enables remote code execution. This issue is related to the Groovy announcement in CVE-2015-3253.

How to fix Arbitrary Code Execution?

Upgrade org.elasticsearch:elasticsearch to version 1.6.1 or higher.

[,1.6.1)
  • M
Directory Traversal

org.elasticsearch:elasticsearch Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

[,1.6.1)
  • H
Arbitrary Code Execution

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Arbitrary Code Execution. The snapshot API may be used indirectly to place snapshot metadata files into locations that are writeable by the user running the Elasticsearch process. It is possible to create a file that another application could read and take action on, resulting in code execution.

How to fix Arbitrary Code Execution?

Upgrade org.elasticsearch:elasticsearch to version 1.6.0 or higher.

[,1.6.0)
  • H
Improper Access Control

org.elasticsearch:elasticsearch The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

[0.6.0,1.3.8) [1.4.0,1.4.3)