GSD-2023-23613
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-23613",
"id": "GSD-2023-23613"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-23613"
],
"details": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.",
"id": "GSD-2023-23613",
"modified": "2023-12-13T01:20:49.926731Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-23613",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "security",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003e= 2.0.0, \u003c 2.5.0"
},
{
"version_affected": "=",
"version_value": "\u003c 1.3.8"
}
]
}
}
]
},
"vendor_name": "opensearch-project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-200",
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6",
"refsource": "MISC",
"url": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6"
},
{
"name": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0",
"refsource": "MISC",
"url": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0"
}
]
},
"source": {
"advisory": "GHSA-v3cg-7r9h-r2g6",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,1.3.8),[2.0.0,2.5.0)",
"affected_versions": "All versions before 1.3.8, all versions starting from 2.0.0 before 2.5.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2023-03-07",
"description": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.",
"fixed_versions": [
"1.3.8",
"2.5.0"
],
"identifier": "CVE-2023-23613",
"identifiers": [
"GHSA-v3cg-7r9h-r2g6",
"CVE-2023-23613"
],
"not_impacted": "All versions starting from 1.3.8 before 2.0.0, all versions starting from 2.5.0",
"package_slug": "maven/org.opensearch.plugin/opensearch-security",
"pubdate": "2023-01-24",
"solution": "Upgrade to versions 1.3.8, 2.5.0 or above.",
"title": "Exposure of Sensitive Information to an Unauthorized Actor",
"urls": [
"https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6",
"https://nvd.nist.gov/vuln/detail/CVE-2023-23613",
"https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0",
"https://github.com/advisories/GHSA-v3cg-7r9h-r2g6"
],
"uuid": "ca342b9c-0ac2-4168-81d8-94102c7dc49d"
},
{
"affected_range": "(,1.3.8),[2.0.0,2.5.0)",
"affected_versions": "All versions before 1.3.8, all versions starting from 2.0.0 before 2.5.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2023-03-07",
"description": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.",
"fixed_versions": [
"1.3.8",
"2.5.0"
],
"identifier": "CVE-2023-23613",
"identifiers": [
"GHSA-v3cg-7r9h-r2g6",
"CVE-2023-23613"
],
"not_impacted": "All versions starting from 1.3.8 before 2.0.0, all versions starting from 2.5.0",
"package_slug": "maven/org.opensearch/opensearch-security",
"pubdate": "2023-01-24",
"solution": "Upgrade to versions 1.3.8, 2.5.0 or above.",
"title": "Exposure of Sensitive Information to an Unauthorized Actor",
"urls": [
"https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6",
"https://nvd.nist.gov/vuln/detail/CVE-2023-23613",
"https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0",
"https://github.com/advisories/GHSA-v3cg-7r9h-r2g6"
],
"uuid": "1ec12163-6b9c-4fad-9b61-dd6a12d3bd3a"
},
{
"affected_range": "(,1.3.8),[2.0.0,2.5.0)",
"affected_versions": "All versions before 1.3.8, all versions starting from 2.0.0 before 2.5.0",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2023-01-24",
"description": "### Advisory title: Field-level security issue with .keyword fields\n\n### Affected versions:\nOpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1\n\n### Patched versions:\nOpenSearch 1.3.8 and 2.5.0\n\n### Impact:\nThere is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields.\n\nThis issue is only present for authenticated users with read access to the indexes containing the restricted fields.\n\n### Workaround:\nFLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue.\n\n### Patches:\nOpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue.\n\n### For more information:\nIf you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.",
"fixed_versions": [
"1.3.8",
"2.5.0"
],
"identifier": "GMS-2023-118",
"identifiers": [
"GHSA-v3cg-7r9h-r2g6",
"GMS-2023-118",
"CVE-2023-23613"
],
"not_impacted": "All versions starting from 1.3.8 before 2.0.0, all versions starting from 2.5.0",
"package_slug": "maven/org.opensearch/opensearch",
"pubdate": "2023-01-24",
"solution": "Upgrade to versions 1.3.8, 2.5.0 or above.",
"title": "Field-level security issue with .keyword fields in OpenSearch",
"urls": [
"https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6",
"https://github.com/advisories/GHSA-v3cg-7r9h-r2g6"
],
"uuid": "12f19173-2db3-4d65-a20f-233212ba44f7"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:-:*:*",
"cpe_name": [],
"versionEndExcluding": "2.5.0",
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:-:*:*",
"cpe_name": [],
"versionEndExcluding": "1.3.8",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-23613"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6"
},
{
"name": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-02-02T17:54Z",
"publishedDate": "2023-01-26T21:18Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…