cve/2018/CVE-2018-3831.md

18 lines
880 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3831](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3831)
![](https://img.shields.io/static/v1?label=Product&message=Elasticsearch&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Information%20Exposure&color=brighgreen)
### Description
Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authenticated Elasticsearch user to improperly view these details.
### POC
#### Reference
- https://www.elastic.co/community/security
#### Github
No PoCs found on GitHub currently.