Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 839981 (CVE-2022-23711)

Summary: <app-misc/elasticsearch-7.17.3: information leak in page source
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: trivial CC: hydrapolic, proxy-maint
Priority: Normal Keywords: PullRequest
Version: unspecified   
Hardware: All   
OS: Linux   
See Also:
Whiteboard: ~4 [noglsa]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-21 22:29:29 UTC

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

Fix in 7.17.3 and 8.1.3.
Comment 1 Larry the Git Cow gentoo-dev 2022-04-24 07:58:24 UTC
The bug has been referenced in the following commit(s):

commit fc96431e36c76038b6f3499bfcbcc9e51bbf75d4
Author:     Tomáš Mózes <>
AuthorDate: 2022-04-23 10:35:17 +0000
Commit:     Joonas Niilola <>
CommitDate: 2022-04-24 07:57:13 +0000

    app-misc/elasticsearch: bump to 7.17.3
    Signed-off-by: Tomáš Mózes <>
    Signed-off-by: Joonas Niilola <>

 app-misc/elasticsearch/Manifest                    |  1 +
 app-misc/elasticsearch/elasticsearch-7.17.3.ebuild | 83 ++++++++++++++++++++++
 2 files changed, 84 insertions(+)
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-25 23:47:47 UTC
Thanks, all done!