OpenSearch Dashboards Tenant Auth Bypass: Metadata Mod Before 1.3.14 / 2.11.0
CVE-2023-45807 Published on October 16, 2023
OpenSearch Issue with tenant read-only permissions
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users dont already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.
Vulnerability Analysis
CVE-2023-45807 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Improper Preservation of Permissions
The software does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
Products Associated with CVE-2023-45807
Want to know whenever a new CVE is published for Amazon Opensearch? stack.watch will email you.
Affected Versions
opensearch-project security:- Version < 1.3.14.0 is affected.
- Version >= 2.0.0.0, < 2.11.0.0 is affected.
Vulnerable Packages
The following package name and versions may be associated with CVE-2023-45807
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| maven | org.opensearch.plugin:opensearch-security | >= 2.0.0.0, < 2.11.0.0 | 2.11.0.0 |
| maven | org.opensearch.plugin:opensearch-security | < 1.3.14.0 | 1.3.14.0 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.