First published: Tue Nov 15 2022(Updated: )
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana. There is an issue with the implementation of fine-grained access control rules (document-level security, field-level security and field masking) where they are not correctly applied to the indices that back data streams potentially leading to incorrect access authorization. OpenSearch 1.3.7 and 2.4.0 contain a fix for this issue. Users are advised to update. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Opensearch | <1.3.7 | |
Amazon Opensearch | >=2.0.0<2.4.0 |
https://github.com/opensearch-project/security/commit/f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41918 is a vulnerability in OpenSearch where fine-grained access control rules are not correctly applied to data streams.
Amazon Opensearch versions up to and including 1.3.7 are affected by CVE-2022-41918.
The severity of CVE-2022-41918 is medium, with a CVSS score of 6.3.
To fix CVE-2022-41918, you should upgrade to a version of Amazon Opensearch that is not affected by the vulnerability.
You can find more information about CVE-2022-41918 on the OpenSearch security advisory page and the GitHub commit linked in the references.