Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 14th, 2019 📆 | 4793 Views ⚑

0

Search Guard up to 23.0 Aggregation Cleartext information disclosure

CVSS Meta Temp Score Current Exploit Price (≈)
3.4 $0-$5k

A vulnerability was found in Search Guard up to 23.0. It has been rated as problematic. Affected by this issue is an unknown functionality of the component Aggregation. The manipulation with an unknown input leads to a information disclosure vulnerability (Cleartext). Using CWE to declare the problem leads to CWE-312. Impacted is confidentiality.

The weakness was presented 08/13/2019. The advisory is shared for download at docs.search-guard.com. This vulnerability is handled as CVE-2019-13419 since 07/08/2019. There are neither technical details nor an exploit publicly available.

Upgrading to version 23.1 eliminates this vulnerability.

See 139869 for similar entry.

Name

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.4
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure / Cleartext (CWE-312)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Search Guard 23.1

07/08/2019 CVE assigned
08/13/2019 +36 days Advisory disclosed
08/14/2019 +1 days VulDB entry created
08/14/2019 +0 days VulDB last updateAdvisory: docs.search-guard.com

CVE: CVE-2019-13419 (🔒)
See also: 🔒

Created: 08/14/2019 01:59 PM
Complete: 🔍

Comments

No comments yet. Please log in to comment.

Use the official API to access entries easily!

https://vuldb.com/?id.139868

Free Download WordPress Themes
Download WordPress Themes
Download Best WordPress Themes Free Download
Download WordPress Themes
free download udemy paid course

Tagged with:



Leave a Reply ✍


loading...