Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 13th, 2019 📆 | 7515 Views ⚑

0

Search Guard up to 23.x API information disclosure

CVSS Meta Temp Score Current Exploit Price (≈)
3.4 $0-$5k

A vulnerability classified as problematic was found in Search Guard up to 23.x. This vulnerability affects an unknown code block of the component API. The manipulation with an unknown input leads to a information disclosure vulnerability. The CWE definition for the vulnerability is CWE-200. As an impact it is known to affect confidentiality.

The weakness was released 08/12/2019. The advisory is shared for download at docs.search-guard.com. This vulnerability was named CVE-2019-13417 since 07/08/2019. There are neither technical details nor an exploit publicly available.

Upgrading to version 24.0 eliminates this vulnerability.

Entry connected to this vulnerability is available at 139817.

Name

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.4
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure (CWE-200)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Search Guard 24.0

07/08/2019 CVE assigned
08/12/2019 +35 days Advisory disclosed
08/13/2019 +1 days VulDB entry created
08/13/2019 +0 days VulDB last updateAdvisory: docs.search-guard.com

CVE: CVE-2019-13417 (🔒)
See also: 🔒

Created: 08/13/2019 07:17 AM
Complete: 🔍

Comments

No comments yet. Please log in to comment.

Upgrade your account now!

https://vuldb.com/?id.139816

Download WordPress Themes
Download WordPress Themes
Premium WordPress Themes Download
Download Best WordPress Themes Free Download
online free course

Tagged with:



Leave a Reply ✍


loading...