Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8wx3-324g-w4qq: OpenSearch uncontrolled resource consumption

Impact

An issue has been identified with how OpenSearch handled incoming requests on the HTTP layer. An unauthenticated user could force an OpenSearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests.

The issue was identified by Elastic Engineering and corresponds to security advisory ESA-2023-13 (CVE-2023-31418).

Mitigation

Versions 1.3.14 and 2.11.0 contain a fix for this issue.

For more information

If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [email protected]. Please do not create a public GitHub issue.

ghsa
#vulnerability#amazon#git#java#aws#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-8wx3-324g-w4qq

OpenSearch uncontrolled resource consumption

Package

maven org.opensearch.plugin:opensearch-security (Maven)

Affected versions

< 1.3.14.0

>= 2.0.0.0, < 2.11.0.0

Patched versions

1.3.14.0

2.11.0.0

Impact

An issue has been identified with how OpenSearch handled incoming requests on the HTTP layer. An unauthenticated user could force an OpenSearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests.

The issue was identified by Elastic Engineering and corresponds to security advisory ESA-2023-13 (CVE-2023-31418).

Mitigation

Versions 1.3.14 and 2.11.0 contain a fix for this issue.

For more information

If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [email protected]. Please do not create a public GitHub issue.

References

  • GHSA-8wx3-324g-w4qq

Published to the GitHub Advisory Database

Oct 17, 2023

ghsa: Latest News

GHSA-pj33-75x5-32j4: RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission