First published: Thu Dec 20 2018(Updated: )
Elasticsearch Security versions 6.4.0 to 6.4.2 contain an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms. A request may receive headers intended for another request if the same username is being authenticated concurrently; when used with run as, this can result in the request running as the incorrect user. This could allow a user to access information that they should not have access to.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Elasticsearch | >=6.4.0<=6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Elasticsearch Security vulnerability is CVE-2018-17244.
The severity of CVE-2018-17244 is medium with a severity value of 6.5.
Elasticsearch Security versions 6.4.0 to 6.4.2 are affected.
In this vulnerability, there is an error in the way request headers are applied to requests when using the Active Directory, LDAP, Native, or File realms in Elasticsearch Security versions 6.4.0 to 6.4.2.
Yes, you can find more information on this vulnerability at the following references: http://www.securityfocus.com/bid/106318, https://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594, https://www.elastic.co/community/security.