ID OPENVAS:1361412562310108275 Type openvas Reporter Copyright (C) 2017 Greenbone Networks GmbH Modified 2018-10-19T00:00:00
Description
This host is running Elasticsearch Kibana with X-Pack and is prone to an
insufficient access restriction vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_elasticsearch_kibana_xpack_CVE-2017-8449_lin.nasl 11983 2018-10-19 10:04:45Z mmartin $
#
# Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Linux)
#
# Authors:
# Christian Fischer <christian.fischer@greenbone.net>
#
# Copyright:
# Copyright (C) 2017 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:elasticsearch:x-pack";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.108275");
script_version("$Revision: 11983 $");
script_cve_id("CVE-2017-8449");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_tag(name:"last_modification", value:"$Date: 2018-10-19 12:04:45 +0200 (Fri, 19 Oct 2018) $");
script_tag(name:"creation_date", value:"2017-10-23 10:54:29 +0200 (Mon, 23 Oct 2017)");
script_name("Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Linux)");
script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
script_category(ACT_GATHER_INFO);
script_family("Web application abuses");
script_dependencies("gb_elasticsearch_kibana_detect.nasl", "os_detection.nasl");
script_mandatory_keys("Elasticsearch/Kibana/X-Pack/Installed", "Host/runs_unixoide");
script_require_ports("Services/www", 5601);
script_xref(name:"URL", value:"https://www.elastic.co/community/security");
script_tag(name:"summary", value:"This host is running Elasticsearch Kibana with X-Pack and is prone to an
insufficient access restriction vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The Flaw would allow access to more fields than the user should have seen
if the field level security rules used a mix of grant and exclude rules when merging multiple rules with
field level security rules for the same index.");
script_tag(name:"affected", value:"All Elasticsearch Kibana X-Pack versions 5.2.x.");
script_tag(name:"solution", value:"Update to Elasticsearch Kibana X-Pack version 5.3.0 or later.");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );
if( vers !~ "^5\.2" ) exit( 0 );
if( version_is_less( version:vers, test_version:"5.3.0" ) ) {
report = report_fixed_ver( installed_version:vers, fixed_version:"5.3.0" );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );
{"id": "OPENVAS:1361412562310108275", "type": "openvas", "bulletinFamily": "scanner", "title": "Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Linux)", "description": "This host is running Elasticsearch Kibana with X-Pack and is prone to an\n insufficient access restriction vulnerability.", "published": "2017-10-23T00:00:00", "modified": "2018-10-19T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310108275", "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "references": ["https://www.elastic.co/community/security"], "cvelist": ["CVE-2017-8449"], "lastseen": "2019-05-29T18:34:55", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-8449"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108276"]}, {"type": "nessus", "idList": ["ELASTICSEARCH_ESA_2017_03.NASL"]}], "modified": "2019-05-29T18:34:55", "rev": 2}, "score": {"value": 5.6, "vector": "NONE", "modified": "2019-05-29T18:34:55", "rev": 2}, "vulnersScore": 5.6}, "pluginID": "1361412562310108275", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_elasticsearch_kibana_xpack_CVE-2017-8449_lin.nasl 11983 2018-10-19 10:04:45Z mmartin $\n#\n# Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Linux)\n#\n# Authors:\n# Christian Fischer <christian.fischer@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:elasticsearch:x-pack\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.108275\");\n script_version(\"$Revision: 11983 $\");\n script_cve_id(\"CVE-2017-8449\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-19 12:04:45 +0200 (Fri, 19 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-10-23 10:54:29 +0200 (Mon, 23 Oct 2017)\");\n script_name(\"Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Linux)\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_elasticsearch_kibana_detect.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"Elasticsearch/Kibana/X-Pack/Installed\", \"Host/runs_unixoide\");\n script_require_ports(\"Services/www\", 5601);\n\n script_xref(name:\"URL\", value:\"https://www.elastic.co/community/security\");\n\n script_tag(name:\"summary\", value:\"This host is running Elasticsearch Kibana with X-Pack and is prone to an\n insufficient access restriction vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The Flaw would allow access to more fields than the user should have seen\n if the field level security rules used a mix of grant and exclude rules when merging multiple rules with\n field level security rules for the same index.\");\n\n script_tag(name:\"affected\", value:\"All Elasticsearch Kibana X-Pack versions 5.2.x.\");\n\n script_tag(name:\"solution\", value:\"Update to Elasticsearch Kibana X-Pack version 5.3.0 or later.\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\nif( vers !~ \"^5\\.2\" ) exit( 0 );\n\nif( version_is_less( version:vers, test_version:\"5.3.0\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"5.3.0\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "naslFamily": "Web application abuses"}
{"cve": [{"lastseen": "2020-12-09T20:13:38", "description": "X-Pack Security 5.2.x would allow access to more fields than the user should have seen if the field level security rules used a mix of grant and exclude rules when merging multiple rules with field level security rules for the same index.", "edition": 8, "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.9, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-06-16T21:29:00", "title": "CVE-2017-8449", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8449"], "modified": "2019-10-09T23:30:00", "cpe": ["cpe:/a:elastic:x-pack:5.2.2"], "id": "CVE-2017-8449", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8449", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:elastic:x-pack:5.2.2:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:34:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-8449"], "description": "This host is running Elasticsearch Kibana with X-Pack and is prone to an\n insufficient access restriction vulnerability.", "modified": "2018-10-19T00:00:00", "published": "2017-10-23T00:00:00", "id": "OPENVAS:1361412562310108276", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310108276", "type": "openvas", "title": "Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_elasticsearch_kibana_xpack_CVE-2017-8449_win.nasl 11983 2018-10-19 10:04:45Z mmartin $\n#\n# Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Windows)\n#\n# Authors:\n# Christian Fischer <christian.fischer@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:elasticsearch:x-pack\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.108276\");\n script_version(\"$Revision: 11983 $\");\n script_cve_id(\"CVE-2017-8449\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-19 12:04:45 +0200 (Fri, 19 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-10-23 10:54:29 +0200 (Mon, 23 Oct 2017)\");\n script_name(\"Elasticsearch Kibana X-Pack 'CVE-2017-8449' Insufficient Access Restriction Vulnerability (Windows)\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_elasticsearch_kibana_detect.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"Elasticsearch/Kibana/X-Pack/Installed\", \"Host/runs_windows\");\n script_require_ports(\"Services/www\", 5601);\n\n script_xref(name:\"URL\", value:\"https://www.elastic.co/community/security\");\n\n script_tag(name:\"summary\", value:\"This host is running Elasticsearch Kibana with X-Pack and is prone to an\n insufficient access restriction vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The Flaw would allow access to more fields than the user should have seen\n if the field level security rules used a mix of grant and exclude rules when merging multiple rules with\n field level security rules for the same index.\");\n\n script_tag(name:\"affected\", value:\"All Elasticsearch Kibana X-Pack versions 5.2.x.\");\n\n script_tag(name:\"solution\", value:\"Update to Elasticsearch Kibana X-Pack version 5.3.0 or later.\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\nif( vers !~ \"^5\\.2\" ) exit( 0 );\n\nif( version_is_less( version:vers, test_version:\"5.3.0\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"5.3.0\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-01T01:57:31", "description": "When merging multiple rules with field level security rules for the\nsame index, X-Pack Security 5.2.x would allow access to more fields\nthan the user should have seen if the field level security rules used\na mix of grant and exclude rules.", "edition": 22, "cvss3": {"score": 5.9, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-08-22T00:00:00", "title": "Elasticsearch ESA-2017-03", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-8449"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:elastic:x-pack"], "id": "ELASTICSEARCH_ESA_2017_03.NASL", "href": "https://www.tenable.com/plugins/nessus/112037", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(112037);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/11/04\");\n\n script_cve_id(\"CVE-2017-8449\");\n\n script_name(english:\"Elasticsearch ESA-2017-03\");\n script_summary(english:\"Checks the version of Elasticsearch.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server hosts a Java application that is affected by an \nunauthorised information disclosure vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"When merging multiple rules with field level security rules for the\nsame index, X-Pack Security 5.2.x would allow access to more fields\nthan the user should have seen if the field level security rules used\na mix of grant and exclude rules.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.elastic.co/community/security\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update X-Pack Security to version 5.3.0.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-8449\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:elastic:x-pack\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"elasticsearch_detect.nbin\");\n script_require_keys(\"installed_sw/Elasticsearch\");\n script_require_ports(\"Services/www\", 9200);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"http.inc\");\ninclude(\"vcf.inc\");\n\napp = \"Elasticsearch\";\n\nget_install_count(app_name:app, exit_if_zero:TRUE);\n\nport = get_http_port(default:9200);\n\napp_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);\n\nif (empty_or_null(app_info[\"Plugins/X-Pack/security\"]))\n audit(AUDIT_WEB_APP_EXT_NOT_INST, app, app_info['path'], \"X-Pack Security plugin\");\n\nconstraints = [\n { \"min_version\" : \"5.2.0\", \"fixed_version\" : \"5.3.0\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}]}