CVE-2017-8438
05.06.2017, 14:29
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen.Enginsight
Vendor | Product | Version |
---|---|---|
elastic | x-pack | 5.0.0 |
elastic | x-pack | 5.0.1 |
elastic | x-pack | 5.0.2 |
elastic | x-pack | 5.1.0 |
elastic | x-pack | 5.1.1 |
elastic | x-pack | 5.2.0 |
elastic | x-pack | 5.2.1 |
elastic | x-pack | 5.2.2 |
elastic | x-pack | 5.3.0 |
elastic | x-pack | 5.3.1 |
elastic | x-pack | 5.3.2 |
elastic | x-pack | 5.3.3 |
elastic | x-pack | 5.4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-269 - Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
References