Open mend-for-github-com[bot] opened 9 months ago
Elasticsearch subproject :server
Library home page: https://github.com/elastic/elasticsearch
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/7.9.3/elasticsearch-7.9.3.jar
Dependency Hierarchy: - transport-7.9.3.jar (Root Library) - :x: **elasticsearch-7.9.3.jar** (Vulnerable Library)
Found in HEAD commit: eb687271afab9d7c61ca82fce2ed4fdb3d5e1a70
Found in base branch: master
It was identified that malformed scripts used in the script processor of an Ingest Pipeline could cause an Elasticsearch node to crash when calling the Simulate Pipeline API.
Publish Date: 2023-11-22
URL: CVE-2023-46673
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://discuss.elastic.co/t/elasticsearch-7-17-14-8-10-3-security-update-esa-2023-24/347708
Release Date: 2023-11-22
Fix Resolution (org.elasticsearch:elasticsearch): 7.17.14
Direct dependency fix Resolution (org.elasticsearch.client:transport): 7.17.14
CVE-2023-46673 - Medium Severity Vulnerability
Vulnerable Library - elasticsearch-7.9.3.jar
Elasticsearch subproject :server
Library home page: https://github.com/elastic/elasticsearch
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/7.9.3/elasticsearch-7.9.3.jar
Dependency Hierarchy: - transport-7.9.3.jar (Root Library) - :x: **elasticsearch-7.9.3.jar** (Vulnerable Library)
Found in HEAD commit: eb687271afab9d7c61ca82fce2ed4fdb3d5e1a70
Found in base branch: master
Vulnerability Details
It was identified that malformed scripts used in the script processor of an Ingest Pipeline could cause an Elasticsearch node to crash when calling the Simulate Pipeline API.
Publish Date: 2023-11-22
URL: CVE-2023-46673
CVSS 3 Score Details (6.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://discuss.elastic.co/t/elasticsearch-7-17-14-8-10-3-security-update-esa-2023-24/347708
Release Date: 2023-11-22
Fix Resolution (org.elasticsearch:elasticsearch): 7.17.14
Direct dependency fix Resolution (org.elasticsearch.client:transport): 7.17.14