Elastic

X-pack

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.49%
  • Published 30.03.2018 20:29:00
  • Last modified 21.11.2024 04:06:06

X-Pack Security versions 6.2.0, 6.2.1, and 6.2.2 are vulnerable to a user impersonation attack via incorrect XML canonicalization and DOM traversal. An attacker might have been able to impersonate a legitimate user if the SAML Identity Provider allow...

  • EPSS 0.11%
  • Published 29.09.2017 01:34:50
  • Last modified 20.04.2025 01:37:25

An error was found in the X-Pack Security 5.3.0 to 5.5.2 privilege enforcement. If a user has either 'delete' or 'index' permissions on an index in a cluster, they may be able to issue both delete and index requests against that index.

  • EPSS 0.31%
  • Published 29.09.2017 01:34:50
  • Last modified 20.04.2025 01:37:25

An error was found in the permission model used by X-Pack Alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges.

  • EPSS 0.03%
  • Published 18.08.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

An error was found in the X-Pack Security TLS trust manager for versions 5.0.0 to 5.5.1. If reloading the trust material fails the trust manager will be replaced with an instance that trusts all certificates. This could allow any node using any certi...

  • EPSS 0.43%
  • Published 07.07.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

Elasticsearch X-Pack Security versions 5.0.0 to 5.4.3, when enabled, can result in the Elasticsearch _nodes API leaking sensitive configuration information, such as the paths and passphrases of SSL keys that were configured as part of an authenticati...

  • EPSS 0.26%
  • Published 16.06.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

X-Pack Security 5.2.x would allow access to more fields than the user should have seen if the field level security rules used a mix of grant and exclude rules when merging multiple rules with field level security rules for the same index.

  • EPSS 0.25%
  • Published 16.06.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

X-Pack 5.1.1 did not properly apply document and field level security to multi-search and multi-get requests so users without access to a document and/or field may have been able to access this information.

  • EPSS 0.41%
  • Published 05.06.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that co...

  • EPSS 0.13%
  • Published 05.06.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

Elastic X-Pack Security versions prior to 5.4.1 and 5.3.3 did not always correctly apply Document Level Security to index aliases. This bug could allow a user with restricted permissions to view data they should not have access to when performing cer...