First published: Thu Oct 26 2023(Updated: )
A flaw was discovered in Elasticsearch affecting the `_search` API that allowed a specially crafted query string to cause a stack overflow and ultimately a denial of service.
Credit: bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.elasticsearch:elasticsearch | >=8.0.0<8.9.1 | 8.9.1 |
maven/org.elasticsearch:elasticsearch | >=7.0.0<7.17.13 | 7.17.13 |
Elastic Elasticsearch | >=7.0.0<=7.17.12 | |
Elastic Elasticsearch | >=8.0.0<=8.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31419 is a vulnerability discovered in Elasticsearch that allows a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.
CVE-2023-31419 has a severity rating of medium with a score of 6.5.
Elasticsearch versions from 8.0.0 to 8.9.1 and from 7.0.0 to 7.17.13 are affected by CVE-2023-31419.
To fix CVE-2023-31419, update your Elasticsearch installation to version 8.9.1 or 7.17.13, depending on the Elasticsearch version you are using.
You can find more information about CVE-2023-31419 on the Elastic community security page, the National Vulnerability Database (NVD) website, and the provided reference links.