Vulnerabilites related to amazon - opensearch_notifications
Vulnerability from fkie_nvd
Published
2022-11-11 19:15
Modified
2024-11-21 07:24
Summary
OpenSearch Notifications is a notifications plugin for OpenSearch that enables other plugins to send notifications via Email, Slack, Amazon Chime, Custom web-hook etc channels. A potential SSRF issue in OpenSearch Notifications Plugin starting in 2.0.0 and prior to 2.2.1 could allow an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Notification plugin's intended scope. OpenSearch 2.2.1+ contains the fix for this issue. There are currently no recommended workarounds.
Impacted products
Vendor Product Version
amazon opensearch_notifications *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amazon:opensearch_notifications:*:*:*:*:*:docker:*:*",
                     matchCriteriaId: "6220A432-32B1-49F6-A758-2C043B311962",
                     versionEndExcluding: "2.2.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "OpenSearch Notifications is a notifications plugin for OpenSearch that enables other plugins to send notifications via Email, Slack, Amazon Chime, Custom web-hook etc channels. A potential SSRF issue in OpenSearch Notifications Plugin starting in 2.0.0 and prior to 2.2.1 could allow an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Notification plugin's intended scope. OpenSearch 2.2.1+ contains the fix for this issue. There are currently no recommended workarounds. \n",
      },
      {
         lang: "es",
         value: "OpenSearch Notifications es un complemento de notificaciones para OpenSearch que permite que otros complementos envíen notificaciones a través de canales de correo electrónico, Slack, Amazon Chime, web-hook personalizado, etc. Un posible problema de SSRF en el complemento de notificaciones de OpenSearch a partir de 2.0.0 y antes de 2.2.1 podría permitir a un usuario privilegiado existente enumerar servicios de escucha o interactuar con recursos configurados a través de solicitudes HTTP que excedan el alcance previsto del complemento de notificación. OpenSearch 2.2.1+ contiene la solución para este problema. Actualmente no existen workarounds recomendados.",
      },
   ],
   id: "CVE-2022-41906",
   lastModified: "2024-11-21T07:24:02.417",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.8,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 5.8,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-11T19:15:11.613",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/opensearch-project/notifications/pull/496",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/opensearch-project/notifications/pull/507",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/opensearch-project/notifications/security/advisories/GHSA-pfc4-3436-jgrw",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/opensearch-project/notifications/pull/496",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/opensearch-project/notifications/pull/507",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/opensearch-project/notifications/security/advisories/GHSA-pfc4-3436-jgrw",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "security-advisories@github.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2022-41906
Vulnerability from cvelistv5
Published
2022-11-11 00:00
Modified
2024-08-03 12:56
Summary
OpenSearch Notifications is a notifications plugin for OpenSearch that enables other plugins to send notifications via Email, Slack, Amazon Chime, Custom web-hook etc channels. A potential SSRF issue in OpenSearch Notifications Plugin starting in 2.0.0 and prior to 2.2.1 could allow an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Notification plugin's intended scope. OpenSearch 2.2.1+ contains the fix for this issue. There are currently no recommended workarounds.
Impacted products
Vendor Product Version
opensearch-project notifications Version: >= 2.0.0, < 2.2.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:56:38.599Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/opensearch-project/notifications/security/advisories/GHSA-pfc4-3436-jgrw",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/opensearch-project/notifications/security/advisories/GHSA-pfc4-3436-jgrw",
               },
               {
                  name: "https://github.com/opensearch-project/notifications/pull/496",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/opensearch-project/notifications/pull/496",
               },
               {
                  name: "https://github.com/opensearch-project/notifications/pull/507",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/opensearch-project/notifications/pull/507",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "notifications",
               vendor: "opensearch-project",
               versions: [
                  {
                     status: "affected",
                     version: ">= 2.0.0, < 2.2.1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "OpenSearch Notifications is a notifications plugin for OpenSearch that enables other plugins to send notifications via Email, Slack, Amazon Chime, Custom web-hook etc channels. A potential SSRF issue in OpenSearch Notifications Plugin starting in 2.0.0 and prior to 2.2.1 could allow an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Notification plugin's intended scope. OpenSearch 2.2.1+ contains the fix for this issue. There are currently no recommended workarounds. \n",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-918",
                     description: "CWE-918: Server-Side Request Forgery (SSRF)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-25T22:25:08.535Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/opensearch-project/notifications/security/advisories/GHSA-pfc4-3436-jgrw",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/opensearch-project/notifications/security/advisories/GHSA-pfc4-3436-jgrw",
            },
            {
               name: "https://github.com/opensearch-project/notifications/pull/496",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/opensearch-project/notifications/pull/496",
            },
            {
               name: "https://github.com/opensearch-project/notifications/pull/507",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/opensearch-project/notifications/pull/507",
            },
         ],
         source: {
            advisory: "GHSA-pfc4-3436-jgrw",
            discovery: "UNKNOWN",
         },
         title: "OpenSearch Notifications is vulnerable to Server-Side Request Forgery (SSRF) ",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2022-41906",
      datePublished: "2022-11-11T00:00:00",
      dateReserved: "2022-09-30T00:00:00",
      dateUpdated: "2024-08-03T12:56:38.599Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}