First published: Tue Feb 11 2025(Updated: )
### Impact The search end-point response headers contain information about Elasticsearch software in use. This information is sensitive from a security point of view because it allows software used by the server to be easily identified. ### Patches GeoNetwork 4.4.5 / 4.2.10 ### Workarounds None ### References - [CVE-2024-32037](https://www.cve.org/CVERecord?id=CVE-2024-32037) - [Search service](https://docs.geonetwork-opensource.org/4.4/api/search/) ### Credits - [Ministry of Economic Affairs and Climate Policy](https://www.rijksoverheid.nl/ministeries/ministerie-van-economische-zaken-en-klimaat), The Netherlands.
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.geonetwork-opensource:gn-services | <4.2.10 | 4.2.10 |
maven/org.geonetwork-opensource:gn-services | >=4.4.0<4.4.5 | 4.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level for GHSA-52rf-25hq-5m33 is classified as sensitive due to the exposure of software version information.
To address GHSA-52rf-25hq-5m33, you should upgrade to either GeoNetwork version 4.2.10 or 4.4.5.
GHSA-52rf-25hq-5m33 exposes sensitive response headers that reveal the specific version of Elasticsearch software in use.
There are currently no workarounds for GHSA-52rf-25hq-5m33, so applying the patches is necessary.
GHSA-52rf-25hq-5m33 affects GeoNetwork versions prior to 4.2.10 and between 4.4.0 and 4.4.5.