Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-22146Resource Exposure in Elasticsearch

CWE-668Resource Exposure4 documents4 sources
Severity
7.5HIGHNVD
EPSS
29.9%
top 3.35%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJul 21
Latest updateMay 24

Description

All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-wxcx-pqjc-2pp9: All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters2022-05-24
CVEList
CVE-2021-22146: All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters2021-07-21

💥Exploits & PoCs

1
Exploit-DB
Elasticsearch ECE 7.13.3 - Anonymous Database Dump2021-07-26
CVE-2021-22146 — Resource Exposure in Elastic | cvebase