CVE-2017-12195

Related Vulnerabilities: CVE-2017-12195  

An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices.

An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices.

Find out more about CVE-2017-12195 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 6.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat OpenShift Container Platform 3.6 (openshift-elasticsearch-plugin) RHSA-2017:3389 2017-12-07
Red Hat OpenShift Container Platform 3.7 (openshift-elasticsearch-plugin) RHSA-2017:3188 2017-11-28
Red Hat OpenShift Container Platform 3.4 (openshift-elasticsearch-plugin) RHSA-2017:3389 2017-12-07
Red Hat OpenShift Container Platform 3.5 (openshift-elasticsearch-plugin) RHSA-2017:3389 2017-12-07

Acknowledgements

This issue was discovered by Rich Megginson (Red Hat).