Vulnerability Description
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elastic | X-Pack | 5.0.0 |
Related Weaknesses (CWE)
References
- https://discuss.elastic.co/t/elastic-stack-5-4-1-and-5-3-3-security-updates/8795Vendor Advisory
- https://www.elastic.co/blog/elasticsearch-5-4-1-and-5-3-3-releasedPatchVendor Advisory
- https://www.elastic.co/community/securityVendor Advisory
- https://discuss.elastic.co/t/elastic-stack-5-4-1-and-5-3-3-security-updates/8795Vendor Advisory
- https://www.elastic.co/blog/elasticsearch-5-4-1-and-5-3-3-releasedPatchVendor Advisory
- https://www.elastic.co/community/securityVendor Advisory
FAQ
What is CVE-2017-8438?
CVE-2017-8438 is a vulnerability with a CVSS score of 8.8 (HIGH). Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. I...
How severe is CVE-2017-8438?
CVE-2017-8438 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8438?
Check the references section above for vendor advisories and patch information. Affected products include: Elastic X-Pack.