gsd-2023-23613
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-23613", "id": "GSD-2023-23613" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-23613" ], "details": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.", "id": "GSD-2023-23613", "modified": "2023-12-13T01:20:49.926731Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-23613", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003e= 2.0.0, \u003c 2.5.0" }, { "version_affected": "=", "version_value": "\u003c 1.3.8" } ] } } ] }, "vendor_name": "opensearch-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-200", "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6", "refsource": "MISC", "url": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6" }, { "name": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0", "refsource": "MISC", "url": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0" } ] }, "source": { "advisory": "GHSA-v3cg-7r9h-r2g6", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "(,1.3.8),[2.0.0,2.5.0)", "affected_versions": "All versions before 1.3.8, all versions starting from 2.0.0 before 2.5.0", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-03-07", "description": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.", "fixed_versions": [ "1.3.8", "2.5.0" ], "identifier": "CVE-2023-23613", "identifiers": [ "GHSA-v3cg-7r9h-r2g6", "CVE-2023-23613" ], "not_impacted": "All versions starting from 1.3.8 before 2.0.0, all versions starting from 2.5.0", "package_slug": "maven/org.opensearch.plugin/opensearch-security", "pubdate": "2023-01-24", "solution": "Upgrade to versions 1.3.8, 2.5.0 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6", "https://nvd.nist.gov/vuln/detail/CVE-2023-23613", "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0", "https://github.com/advisories/GHSA-v3cg-7r9h-r2g6" ], "uuid": "ca342b9c-0ac2-4168-81d8-94102c7dc49d" }, { "affected_range": "(,1.3.8),[2.0.0,2.5.0)", "affected_versions": "All versions before 1.3.8, all versions starting from 2.0.0 before 2.5.0", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-03-07", "description": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.", "fixed_versions": [ "1.3.8", "2.5.0" ], "identifier": "CVE-2023-23613", "identifiers": [ "GHSA-v3cg-7r9h-r2g6", "CVE-2023-23613" ], "not_impacted": "All versions starting from 1.3.8 before 2.0.0, all versions starting from 2.5.0", "package_slug": "maven/org.opensearch/opensearch-security", "pubdate": "2023-01-24", "solution": "Upgrade to versions 1.3.8, 2.5.0 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6", "https://nvd.nist.gov/vuln/detail/CVE-2023-23613", "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0", "https://github.com/advisories/GHSA-v3cg-7r9h-r2g6" ], "uuid": "1ec12163-6b9c-4fad-9b61-dd6a12d3bd3a" }, { "affected_range": "(,1.3.8),[2.0.0,2.5.0)", "affected_versions": "All versions before 1.3.8, all versions starting from 2.0.0 before 2.5.0", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2023-01-24", "description": "### Advisory title: Field-level security issue with .keyword fields\n\n### Affected versions:\nOpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1\n\n### Patched versions:\nOpenSearch 1.3.8 and 2.5.0\n\n### Impact:\nThere is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields.\n\nThis issue is only present for authenticated users with read access to the indexes containing the restricted fields.\n\n### Workaround:\nFLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue.\n\n### Patches:\nOpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue.\n\n### For more information:\nIf you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.", "fixed_versions": [ "1.3.8", "2.5.0" ], "identifier": "GMS-2023-118", "identifiers": [ "GHSA-v3cg-7r9h-r2g6", "GMS-2023-118", "CVE-2023-23613" ], "not_impacted": "All versions starting from 1.3.8 before 2.0.0, all versions starting from 2.5.0", "package_slug": "maven/org.opensearch/opensearch", "pubdate": "2023-01-24", "solution": "Upgrade to versions 1.3.8, 2.5.0 or above.", "title": "Field-level security issue with .keyword fields in OpenSearch", "urls": [ "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6", "https://github.com/advisories/GHSA-v3cg-7r9h-r2g6" ], "uuid": "12f19173-2db3-4d65-a20f-233212ba44f7" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:-:*:*", "cpe_name": [], "versionEndExcluding": "2.5.0", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:-:*:*", "cpe_name": [], "versionEndExcluding": "1.3.8", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-23613" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6" }, { "name": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-02T17:54Z", "publishedDate": "2023-01-26T21:18Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…