Headline
GHSA-c6wg-cm5x-rqvj: OpenSearch has time discrepancy in authentication responses
Impact
There is an observable discrepancy in the authentication response time between calls where the user provided exists and calls where it does not. This issue only affects calls using the internal basic identity provider (IdP), and not other externally configured IdPs.
Patches
OpenSearch 1.3.9 and 2.6.0
Workarounds
None.
References
If you have any questions or comments about this advisory, please contact AWS/Amazon Security using our issue reporting page [1] or directly via email [2]. Please do not create a public GitHub issue.
[1] AWS Security issue reporting page: https://aws.amazon.com/security/vulnerability-reporting/ [2] AWS Security email: [email protected]
Package
maven org.opensearch.plugin:opensearch-security (Maven)
Affected versions
< 1.3.9
>= 2.0.0, < 2.6.0
Patched versions
1.3.9
2.6.0
Description
Impact
There is an observable discrepancy in the authentication response time between calls where the user provided exists and calls where it does not. This issue only affects calls using the internal basic identity provider (IdP), and not other externally configured IdPs.
Patches
OpenSearch 1.3.9 and 2.6.0
Workarounds
None.
References
If you have any questions or comments about this advisory, please contact AWS/Amazon Security using our issue reporting page [1] or directly via email [2]. Please do not create a public GitHub issue.
[1] AWS Security issue reporting page: https://aws.amazon.com/security/vulnerability-reporting/
[2] AWS Security email: [email protected]
References
- GHSA-c6wg-cm5x-rqvj
- https://nvd.nist.gov/vuln/detail/CVE-2023-25806
- opensearch-project/security#2472
CEHENKLE published to opensearch-project/security
Feb 28, 2023
Published by the National Vulnerability Database
Mar 2, 2023
Published to the GitHub Advisory Database
Mar 7, 2023
Reviewed
Mar 7, 2023
Last updated
Mar 7, 2023
Related news
OpenSearch Security is a plugin for OpenSearch that offers encryption, authentication and authorization. There is an observable discrepancy in the authentication response time between calls where the user provided exists and calls where it does not. This issue only affects calls using the internal basic identity provider (IdP), and not other externally configured IdPs. Patches were released in versions 1.3.9 and 2.6.0, there are no workarounds.