CVE-2019-13421

Search Guard versions before 23.1 had an issue that an administrative user is able to retrieve bcrypt password hashes of other users configured in the internal user database.
Configurations

Configuration 1 (hide)

cpe:2.3:a:search-guard:search_guard:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:24

Type Values Removed Values Added
References () https://docs.search-guard.com/6.x-23/changelog-searchguard-6-x-23_1 - Release Notes () https://docs.search-guard.com/6.x-23/changelog-searchguard-6-x-23_1 - Release Notes
References () https://search-guard.com/cve-advisory/ - Vendor Advisory () https://search-guard.com/cve-advisory/ - Vendor Advisory
References () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SySS-2018-025.txt - Exploit, Third Party Advisory () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SySS-2018-025.txt - Exploit, Third Party Advisory

Information

Published : 2019-08-23 14:15

Updated : 2024-11-21 04:24


NVD link : CVE-2019-13421

Mitre link : CVE-2019-13421

CVE.ORG link : CVE-2019-13421


JSON object : View

Products Affected

search-guard

  • search_guard
CWE
CWE-522

Insufficiently Protected Credentials

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor