CVE-2017-8438
moderate-risk
Published 2017-06-05
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen.
Do I need to act?
-
0.41% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (13)
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
X-Pack
Affected Vendors
References (6)
Vendor Advisory
https://www.elastic.co/community/security
Vendor Advisory
https://www.elastic.co/community/security
49
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
2/34 · Minimal
Exposure
17/34 · Moderate