First published: Thu Oct 22 2020(Updated: )
Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/elasticsearch | <7.9.2 | 7.9.2 |
redhat/elasticsearch | <6.8.13 | 6.8.13 |
Elastic Elasticsearch | <6.8.13 | |
Elastic Elasticsearch | >=7.0.0<7.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-7020.
The severity level of CVE-2020-7020 is low (3.1).
Elasticsearch versions before 6.8.13 and 7.9.2 are affected by CVE-2020-7020.
CVE-2020-7020 can result in the disclosure of document existence.
To fix CVE-2020-7020, it is recommended to upgrade to Elasticsearch 6.8.13 or 7.9.2.