First published: Tue Dec 17 2024(Updated: )
An issue was discovered where improper authorization controls affected certain queries that could allow a malicious actor to circumvent Document Level Security in Elasticsearch and get access to documents that their roles would normally not allow.
Credit: bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.elasticsearch:elasticsearch | >=8.16.0<8.16.2 | 8.16.2 |
Elastic Elasticsearch | >=8.16.0<8.16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12539 is considered a critical vulnerability due to its potential to allow unauthorized access to sensitive documents.
To mitigate CVE-2024-12539, upgrade to Elasticsearch version 8.16.2 or later.
The risks include the unauthorized access of documents that should be protected by Document Level Security, which could lead to data breaches.
CVE-2024-12539 affects Elasticsearch versions from 8.16.0 to 8.16.2.
Yes, CVE-2024-12539 can be exploited remotely by malicious actors through specific queries.