CVE-2022-41917

OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana. OpenSearch allows users to specify a local file when defining text analyzers to process data for text analysis. An issue in the implementation of this feature allows certain specially crafted queries to return a response containing the first line of text from arbitrary files. The list of potentially impacted files is limited to text files with read permissions allowed in the Java Security Manager policy configuration. OpenSearch version 1.3.7 and 2.4.0 contain a fix for this issue. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:amazon:opensearch:*:*:*:*:*:*:*:*
cpe:2.3:a:amazon:opensearch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
References () https://github.com/opensearch-project/OpenSearch/commit/6d20423f5920745463b1abc5f1daf6a786c41aa0 - Patch, Third Party Advisory () https://github.com/opensearch-project/OpenSearch/commit/6d20423f5920745463b1abc5f1daf6a786c41aa0 - Patch, Third Party Advisory
References () https://github.com/opensearch-project/OpenSearch/security/advisories/GHSA-w3rx-m34v-wrqx - Third Party Advisory () https://github.com/opensearch-project/OpenSearch/security/advisories/GHSA-w3rx-m34v-wrqx - Third Party Advisory

10 Jul 2023, 16:48

Type Values Removed Values Added
CWE CWE-200 CWE-755

Information

Published : 2022-11-16 00:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-41917

Mitre link : CVE-2022-41917

CVE.ORG link : CVE-2022-41917


JSON object : View

Products Affected

amazon

  • opensearch
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-755

Improper Handling of Exceptional Conditions