6.5
CVSSv3

CVE-2023-23613

Published: 26/01/2023 Updated: 02/02/2023
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

amazon opensearch

Vendor Advisories

Debian Bug report logs - #1054912 opensearch: CVE-2023-45807 CVE-2023-31141 CVE-2023-23613 CVE-2023-23612 Package: src:opensearch; Maintainer for src:opensearch is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sat, 28 Oct 2023 14:45:02 UT ...