
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN138
_____________________________________________________________________

DATE                : 05/03/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Elasticsearch versions prior to
                                        7.11.0, 6.8.14,
                        Kibana versions prior to 7.10.2, 6.8.14.

=====================================================================
https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835
https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915
_____________________________________________________________________


Elastic Stack 7.11.0 Security Update
Announcements Security Announcements
douglasday (Douglas Day) March 1, 2021, 4:55pm #1

Elasticsearch field disclosure flaw (ESA-2021-05)

A document disclosure flaw was found in Elasticsearch when Document or
Field Level Security is used. Get requests do not properly apply
security permissions when executing a query against a recently updated
document. This affects documents that have been updated and not yet
refreshed in the index. This could result in the search disclosing the
existence of documents and fields the attacker should not be able to
view. A mitigating factor to this flaw is an attacker must know the
document ID to run the get request.

Affected Versions:

All versions of Elasticsearch after 7.6.0 and before 7.11.0 are affected
by this flaw

Solutions and Mitigations:

Anyone using Document or Field Level Security should upgrade to
Elasticsearch version 7.11.0. There is no known workaround for this
flaw.

CVSSv3 - 2.6: AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE ID: CVE-2021-22134

________________________________________________________________________


Elastic Stack 7.11.0 and 6.8.14 Security Update
Announcements Security Announcements
douglasday (Douglas Day) February 10, 2021, 5:50pm #1

Elasticsearch information disclosure (ESA-2021-03)

Elasticsearch versions before 7.10.0 and 6.8.14 have an information
disclosure issue when audit logging and the emit_request_body option is
enabled. The Elasticsearch audit log could contain sensitive information
such as password hashes or authentication tokens. This could allow an
Elasticsearch administrator to view these details.

Affected Versions:

All versions of Elasticsearch before 7.10.0 and 6.8.14 are affected by
this flaw

Solutions and Mitigations:

Anyone using audit logging with the
xpack.security.audit.logfile.events.emit_request_body enabled should
upgrade to Elasticsearch version 7.10.0 or 6.8.14. This issue can be
worked around by disabling the emit_request_body option in the
elasticsearch.yml file.

CVSSv3 - 1.9: AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

CVE ID: CVE-2020-7021


Kibana visualization XSS (ESA-2021-04)

The Kibana “Vega” visualization type is susceptible to both stored and
reflected XSS via a vulnerable version of the Vega library. Users who
can create these visualizations or craft a vulnerable URL describing
this visualization can execute arbitrary JavaScript in the victim’s
browser.

Affected Versions:

All versions of Kibana before 7.10.2 and 6.8.14 are affected by this flaw

Solutions and Mitigations:

Users should upgrade to Kibana version 7.10.2 or 6.8.14. Users unable to
upgrade can disable Vega visualizations by setting ‘vega.enabled: false’
in the kibana.yml file.

CVSSv3 - 8.7: AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

CVE ID: CVE-2020-26296

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




