First published: Tue Dec 05 2023(Updated: )
An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.elasticsearch:elasticsearch-hadoop | >=8.0.0<8.9.0 | 8.9.0 |
maven/org.elasticsearch:elasticsearch-hadoop | <7.17.11 | 7.17.11 |
Elastic | <7.17.11 | |
Elastic | >=8.0.0<8.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46674 is classified as a high severity vulnerability due to potential exploitation through unsafe deserialization of objects.
CVE-2023-46674 affects versions of Elasticsearch Hadoop between 8.0.0 and 8.9.0, as well as version 7.17.11.
To mitigate CVE-2023-46674, update your Elasticsearch Hadoop to version 8.9.0 or 7.17.11.
CVE-2023-46674 involves unsafe deserialization of Java objects that can be manipulated by authenticated users.
CVE-2023-46674 impacts environments using Elasticsearch Hadoop alongside the specified vulnerable versions.