CVE-2023-31417
low-risk
Published 2023-10-26
Elasticsearch generally filters out sensitive information and credentials before logging to the audit log. It was found that this filtering was not applied when requests to Elasticsearch use certain deprecated URIs for APIs. The impact of this flaw is that sensitive information such as passwords and tokens might be printed in cleartext in Elasticsearch audit logs. Note that audit logging is disabled by default and needs to be explicitly enabled and even when audit logging is enabled, request bodies that could contain sensitive information are not printed to the audit log unless explicitly configured.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.1/10
Medium
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://security.netapp.com/advisory/ntap-20231130-0006/
Vendor Advisory
https://www.elastic.co/community/security
Third Party Advisory
https://security.netapp.com/advisory/ntap-20231130-0006/
Vendor Advisory
https://www.elastic.co/community/security
16
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal