
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service. The vulnerability affects Elasticsearch versions from 7.0.0 to 7.17.12 and from 8.0.0 to 8.9.0. This vulnerability was assigned CVE-2023-31419 and has been given a CVSS v3.1 base score of 7.5 (High) (NVD).
The vulnerability is related to a buffer overflow condition in the _search API of Elasticsearch. When handling maliciously crafted query strings, the application can experience a stack overflow condition. The vulnerability has been assigned a CVSS vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating it can be exploited remotely with low attack complexity and requires no privileges or user interaction (Fortiguard).
Successful exploitation of this vulnerability could lead to a Denial of Service (DoS) condition on affected systems. The vulnerability affects the availability of the system while having no direct impact on confidentiality or integrity (NetApp Advisory).
The issue has been resolved in Elasticsearch versions 7.17.13 and 8.9.1. Users are advised to upgrade to these patched versions to mitigate the vulnerability (Elastic Discussion).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."