In Elastic Cloud Enterprise (ECE) versions before 1.1.4 it exists that a user could scale out allocators on new hosts with an invalid roles token. An attacker with access to the previous runner ID and IP address of the coordinator-host could add a allocator to an existing ECE install to gain access to other clusters data.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
elastic elastic cloud enterprise |