FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

elasticsearch -- cross site scripting vulnerability in the CORS functionality

Affected packages
elasticsearch < 1.4.0

Details

VuXML ID 5951fb49-1ba2-11e5-b43d-002590263bf5
Discovery 2014-10-01
Entry 2015-06-26

Elastic reports:

Vulnerability Summary: Elasticsearch versions 1.3.x and prior have a default configuration for CORS that allows an attacker to craft links that could cause a user's browser to send requests to Elasticsearch instances on their local network. These requests could cause data loss or compromise.

Remediation Summary: Users should either set "http.cors.enabled" to false, or set "http.cors.allow-origin" to the value of the server that should be allowed access, such as localhost or a server hosting Kibana. Disabling CORS entirely with the former setting is more secure, but may not be suitable for all use cases.

References

Bugtraq ID 70233
CVE Name CVE-2014-6439
URL http://www.securityfocus.com/archive/1/archive/1/533602/100/0/threaded
URL https://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html
URL https://www.elastic.co/blog/elasticsearch-1-4-0-beta-released
URL https://www.elastic.co/community/security