Elasticsearch ESA-2018-10

Medium Nessus Plugin ID 112045

Synopsis

The remote web server hosts a Java application that is affected by an unauthorised information disclosure vulnerability.

Description

In Elasticsearch versions 6.0.0-beta1 to 6.2.4 a disclosure flaw was found in the _snapshot API. When the access_key and security_key parameters are set using the _snapshot API they can be exposed as plain text by users able to query the _snapshot API.Although it is advised in the 6.X _snapshot API documentation to define the access_key and security_key parameters in the keystore, it is still possible to define them outside of the keystore using the API.

Solution

All users of Elasticsearch should upgrade to version 6.3.0. This update will prevent the _snapshot API from returning the access_key and security_key parameters in plain text.

See Also

https://www.elastic.co/community/security

Plugin Details

Severity: Medium

ID: 112045

File Name: elasticsearch_esa_2018_10.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 2018/08/22

Modified: 2018/09/17

Dependencies: 109941

Risk Information

Risk Factor: Medium

CVSS Score Source: manual

CVSS Score Rationale: Information disclosure over network.

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:elastic:x-pack

Required KB Items: installed_sw/Elasticsearch

Patch Publication Date: 2018/06/13

Vulnerability Publication Date: 2018/06/13

Reference Information

CVE: CVE-2018-3826