All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163655/Elasticsearch-ECE-7.13.3-Database-Disclosure.html | Exploit Third Party Advisory VDB Entry |
https://discuss.elastic.co/t/elastic-cloud-enterprise-security-update/279180 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210819-0005/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-07-21 15:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-22146
Mitre link : CVE-2021-22146
CVE.ORG link : CVE-2021-22146
JSON object : View
Products Affected
elastic
- elasticsearch
CWE