An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices.
Find out more about CVE-2017-12195 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 6.5 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | None |
Platform | Errata | Release Date |
---|---|---|
Red Hat OpenShift Container Platform 3.6 (openshift-elasticsearch-plugin) | RHSA-2017:3389 | 2017-12-07 |
Red Hat OpenShift Container Platform 3.7 (openshift-elasticsearch-plugin) | RHSA-2017:3188 | 2017-11-28 |
Red Hat OpenShift Container Platform 3.4 (openshift-elasticsearch-plugin) | RHSA-2017:3389 | 2017-12-07 |
Red Hat OpenShift Container Platform 3.5 (openshift-elasticsearch-plugin) | RHSA-2017:3389 | 2017-12-07 |