First published: Thu Jan 14 2021(Updated: )
Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/elasticsearch | <7.10.2 | 7.10.2 |
Elastic Elasticsearch | >=7.7.0<7.10.2 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22132 is a vulnerability in Elasticsearch versions 7.7.0 to 7.10.1 that allows an attacker to obtain sensitive request headers of other users.
CVE-2021-22132 is considered a medium severity vulnerability.
CVE-2021-22132 allows an attacker to improperly store HTTP headers and retrieve them, potentially exposing sensitive information of other users.
To fix CVE-2021-22132, upgrade Elasticsearch to version 7.10.2 or later.
You can find more information about CVE-2021-22132 in the references provided: [Link 1](https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164) [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1923183) [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1923185)