### [CVE-2017-8438](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8438) ![](https://img.shields.io/static/v1?label=Product&message=X-Pack%20Security&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen) ### Description Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen. ### POC #### Reference - https://www.elastic.co/community/security #### Github No PoCs found on GitHub currently.