Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

CVE-2017-8448

Disclosure Date: September 29, 2017 (last updated November 26, 2024)
An error was found in the permission model used by X-Pack Alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges.
0
Attacker Value
Unknown

CVE-2017-8450

Disclosure Date: June 16, 2017 (last updated November 26, 2024)
X-Pack 5.1.1 did not properly apply document and field level security to multi-search and multi-get requests so users without access to a document and/or field may have been able to access this information.
0
Attacker Value
Unknown

CVE-2017-8438

Disclosure Date: June 05, 2017 (last updated November 26, 2024)
Elastic X-Pack Security versions 5.0.0 to 5.4.0 contain a privilege escalation bug in the run_as functionality. This bug prevents transitioning into the specified user specified in a run_as request. If a role has been created using a template that contains the _user properties, the behavior of run_as will be incorrect. Additionally if the run_as user specified does not exist, the transition will not happen.
0
Attacker Value
Unknown

CVE-2016-0728

Disclosure Date: February 08, 2016 (last updated November 25, 2024)
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.