Elasticsearch stores private key on disk unencrypted
Moderate severity
GitHub Reviewed
Published
Jul 31, 2024
to the GitHub Advisory Database
•
Updated Jul 31, 2024
Package
Affected versions
>= 8.0.0-alpha1, < 8.13.0
< 7.17.23
Patched versions
8.13.0
7.17.23
Description
Published by the National Vulnerability Database
Jul 31, 2024
Published to the GitHub Advisory Database
Jul 31, 2024
Reviewed
Jul 31, 2024
Last updated
Jul 31, 2024
It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the
--pass
parameter is passed in the command invocation.References