org.elasticsearch.plugin:x-pack-core@8.10.4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.elasticsearch.plugin:x-pack-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Exposure of Sensitive Information to an Unauthorized Actor

Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor via the Remote Cluster Search Cross Cluster API Key. If a cross-cluster API key restricts search for a given index using the query or the field_security parameter, and the same cross-cluster API key also grants replication for the same index, the search restrictions are not enforced during cross cluster search operations and search results may include documents and terms that should not be returned.

Note:

This issue only affects the API key based security model for remote clusters 4 that was previously a beta feature and is released as GA with 8.14.0.

How to fix Exposure of Sensitive Information to an Unauthorized Actor?

Upgrade org.elasticsearch.plugin:x-pack-core to version 8.14.0 or higher.

[8.10.0,8.14.0)
  • M
Uncaught Exception

Affected versions of this package are vulnerable to Uncaught Exception when an encrypted PDF is passed to an attachment processor through the REST API. An attacker can trigger a crash by sending such an attachment. Unencrypted files and password-protected files are not vulnerable.

How to fix Uncaught Exception?

Upgrade org.elasticsearch.plugin:x-pack-core to version 8.11.1 or higher.

[8.4.0,8.11.1)
  • M
Incorrect Authorization

Affected versions of this package are vulnerable to Incorrect Authorization in the API-key-based security model for Remote Cluster Security (in beta). This allows a malicious user with a valid API key for a remote cluster configured to use Remote Cluster Security to read arbitrary documents from any index on the remote cluster, using the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID, and the document ID.

Note:

None of the Elasticsearch REST API endpoints are affected by this issue.

How to fix Incorrect Authorization?

Upgrade org.elasticsearch.plugin:x-pack-core to version 8.13.0 or higher.

[8.10.0,8.13.0)