You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: yang-db/fuse-dv/fuse-dv-unipop/pom.xml
Path to vulnerable library: m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar
Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
CVE-2020-7020 - Low Severity Vulnerability
Vulnerable Library - elasticsearch-6.5.4.jar
Elasticsearch subproject :server
Library home page: https://github.com/elastic/elasticsearch
Path to dependency file: yang-db/fuse-dv/fuse-dv-unipop/pom.xml
Path to vulnerable library: m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,/home/wss-scanner/.m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar,m2/repository/org/elasticsearch/elasticsearch/6.5.4/elasticsearch-6.5.4.jar
Dependency Hierarchy:
Found in HEAD commit: 80fe93fc00cbc4c1911c0b9dc69dafa73a316d66
Vulnerability Details
Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
Publish Date: 2020-10-22
URL: CVE-2020-7020
CVSS 3 Score Details (3.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033
Release Date: 2020-07-21
Fix Resolution: org.elasticsearch:elasticsearch:6.8.13,7.9.3
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: