First published: Fri Aug 12 2022(Updated: )
OpenSearch Security is a plugin for OpenSearch that offers encryption, authentication and authorization. Versions 2.0.0.0 and 2.1.0.0 of the security plugin are affected by an information disclosure vulnerability. Requests to an OpenSearch cluster configured with advanced access control features document level security (DLS), field level security (FLS), and/or field masking will not be filtered when the query's search pattern matches an aliased index. OpenSearch Dashboards creates an alias to `.kibana` by default, so filters with the index pattern of `*` to restrict access to documents or fields will not be applied. This issue allows requests to access sensitive information when customer have acted to restrict access that specific information. OpenSearch 2.2.0, which is compatible with OpenSearch Security 2.2.0.0, contains the fix for this issue. There is no recommended work around.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Opensearch | =2.0.0 | |
Amazon Opensearch | =2.1.0 |
https://github.com/opensearch-project/security/commit/7eaaafec2939d7db23a02ffca9cc68e0343de246
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35980 is an information disclosure vulnerability in OpenSearch Security plugin.
CVE-2022-35980 has a severity value of 7.5 (High).
Versions 2.0.0.0 and 2.1.0.0 of OpenSearch Security plugin are affected by CVE-2022-35980.
To fix CVE-2022-35980, upgrade to a version of OpenSearch Security plugin that is not affected by the vulnerability.
You can find more information about CVE-2022-35980 in the OpenSearch Security plugin's GitHub repository and security advisories.