Vulnerability Details CVE-2018-3831
Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authenticated Elasticsearch user to improperly view these details.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.8%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 4.0
Products affected by CVE-2018-3831
-
cpe:2.3:a:elastic:elasticsearch:5.6.0
-
cpe:2.3:a:elastic:elasticsearch:5.6.1
-
cpe:2.3:a:elastic:elasticsearch:5.6.10
-
cpe:2.3:a:elastic:elasticsearch:5.6.11
-
cpe:2.3:a:elastic:elasticsearch:5.6.2
-
cpe:2.3:a:elastic:elasticsearch:5.6.3
-
cpe:2.3:a:elastic:elasticsearch:5.6.4
-
cpe:2.3:a:elastic:elasticsearch:5.6.5
-
cpe:2.3:a:elastic:elasticsearch:5.6.6
-
cpe:2.3:a:elastic:elasticsearch:5.6.7
-
cpe:2.3:a:elastic:elasticsearch:5.6.8
-
cpe:2.3:a:elastic:elasticsearch:5.6.9
-
cpe:2.3:a:elastic:elasticsearch:6.0.0
-
cpe:2.3:a:elastic:elasticsearch:6.0.1
-
cpe:2.3:a:elastic:elasticsearch:6.1.0
-
cpe:2.3:a:elastic:elasticsearch:6.1.1
-
cpe:2.3:a:elastic:elasticsearch:6.1.2
-
cpe:2.3:a:elastic:elasticsearch:6.1.3
-
cpe:2.3:a:elastic:elasticsearch:6.1.4
-
cpe:2.3:a:elastic:elasticsearch:6.2.0
-
cpe:2.3:a:elastic:elasticsearch:6.2.1
-
cpe:2.3:a:elastic:elasticsearch:6.2.2
-
cpe:2.3:a:elastic:elasticsearch:6.2.3
-
cpe:2.3:a:elastic:elasticsearch:6.2.4
-
cpe:2.3:a:elastic:elasticsearch:6.3.0
-
cpe:2.3:a:elastic:elasticsearch:6.3.1
-
cpe:2.3:a:elastic:elasticsearch:6.3.2
-
cpe:2.3:a:elastic:elasticsearch:6.4.0