CVE-2023-23613

EUVD-2023-0551
OpenSearch is an open source distributed and RESTful search engine. In affected versions there is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. This may expose data which may otherwise not be accessible to the user. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. Users unable to upgrade may write explicit exclusion rules as a workaround. Policies authored in this way are not subject to this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.7 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
GitHub_MCNA
5.7 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
Affected Products (NVD)
VendorProductVersion
amazonopensearch
1.0.0 ≤
𝑥
< 1.3.8
amazonopensearch
2.0.0 ≤
𝑥
< 2.5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opensearch
sid
vulnerable
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opensearch
bionic
ignored
focal
dne
jammy
dne
lunar
dne
mantic
dne
noble
needs-triage
oracular
dne
trusty
ignored
xenial
ignored