mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
26 lines
1.2 KiB
Markdown
26 lines
1.2 KiB
Markdown
![]() |
### [CVE-2021-22146](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22146)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/163655/Elasticsearch-ECE-7.13.3-Database-Disclosure.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/errorecho/CVEs-Collection
|
||
|
- https://github.com/k0mi-tg/CVE-POC
|
||
|
- https://github.com/magichk/cve-2021-22146
|
||
|
- https://github.com/manas3c/CVE-POC
|
||
|
- https://github.com/muneebaashiq/MBProjects
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/whoforget/CVE-POC
|
||
|
- https://github.com/youwizard/CVE-POC
|
||
|
|