CVE-2023-31418
issue vulnerability in elasticsearch (Maven)
What is CVE-2023-31418 About?
This issue in Elasticsearch's HTTP layer allows an unauthenticated user to trigger an OutOfMemory error. By sending a moderate number of malformed HTTP requests, an attacker can cause the Elasticsearch node to crash. The ease of exploitation is moderate, as it requires crafting specific malformed requests to deplete memory resources.
Affected Software
- org.elasticsearch:elasticsearch
- >8.0.0, <8.9.0
- <7.17.13
Technical Details
The vulnerability stems from an unspecified flaw in how Elasticsearch processes incoming HTTP requests. An unauthenticated attacker can send a moderate volume of malformed HTTP requests to an Elasticsearch node. These requests, due to the processing defect, consume excessive memory resources on the server. Continuously sending such requests can exhaust the available memory, leading to an OutOfMemory error and forcing the Elasticsearch node to unexpectedly exit, resulting in a denial of service (DoS).
What is the Impact of CVE-2023-31418?
Successful exploitation may allow attackers to cause a denial of service by forcing an Elasticsearch node to exit, disrupting service availability.
What is the Exploitability of CVE-2023-31418?
Exploitation is possible remotely and does not require authentication or elevated privileges. The complexity involves crafting a moderate number of malformed HTTP requests that are specifically designed to trigger the memory exhaustion condition. Attackers need network access to the Elasticsearch HTTP layer. The primary risk factor is the public exposure of the Elasticsearch HTTP interface, allowing arbitrary unauthenticated users to send requests that can lead to service interruption.
What are the Known Public Exploits?
| PoC Author | Link | Commentary |
|---|---|---|
| No known exploits | ||
What are the Available Fixes for CVE-2023-31418?
Available Upgrade Options
- org.elasticsearch:elasticsearch
- <7.17.13 → Upgrade to 7.17.13
- org.elasticsearch:elasticsearch
- >8.0.0, <8.9.0 → Upgrade to 8.9.0
Struggling with dependency upgrades?
See how Resolved Security's drop-in replacements make it simple.
Book a demoAdditional Resources
- https://discuss.elastic.co/t/elasticsearch-8-9-0-7-17-13-security-update/343616
- https://www.elastic.co/community/security
- https://discuss.elastic.co/t/elasticsearch-8-9-0-7-17-13-security-update/343616
- https://www.elastic.co/community/security
- https://security.netapp.com/advisory/ntap-20231130-0005/
- https://security.netapp.com/advisory/ntap-20231130-0005
- https://osv.dev/vulnerability/GHSA-2cqf-6xv9-f22w
- https://nvd.nist.gov/vuln/detail/CVE-2023-31418
What are Similar Vulnerabilities to CVE-2023-31418?
Similar Vulnerabilities: CVE-2023-31419 , CVE-2022-31677 , CVE-2021-22926 , CVE-2020-7014 , CVE-2019-10247
