First published: Thu Jun 13 2024(Updated: )
A flaw was discovered in Elasticsearch, affecting document ingestion when an index template contains a dynamic field mapping of “passthrough” type. Under certain circumstances, ingesting documents in this index would cause a StackOverflow exception to be thrown and ultimately lead to a Denial of Service. Note that passthrough fields is an experimental feature.
Credit: bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.elasticsearch:elasticsearch | >=8.13.1<8.14.0 | 8.14.0 |
Elastic | >=8.13.1<8.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37280 is classified as a high severity vulnerability due to its potential to cause a StackOverflow exception during document ingestion.
To mitigate CVE-2024-37280, update Elasticsearch to version 8.14.0 or higher, ensuring dynamic field mappings do not include 'passthrough' types in index templates.
CVE-2024-37280 affects Elasticsearch versions between 8.13.1 and 8.14.0.
Using affected versions of Elasticsearch may lead to application crashes or denial of service due to the StackOverflow exceptions.
Organizations should assess their current Elasticsearch versions and prioritize updating to the fixed version to prevent exploitation of CVE-2024-37280.