An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3294 | An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue. |
Github GHSA |
GHSA-rv74-m283-5j95 | Elasticsearch-hadoop Unsafe Deserialization |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-08-28T14:26:21.336Z
Reserved: 2023-10-24T17:28:32.186Z
Link: CVE-2023-46674
Updated: 2024-08-02T20:53:21.108Z
Status : Modified
Published: 2023-12-05T18:15:12.380
Modified: 2024-11-21T08:29:02.453
Link: CVE-2023-46674
OpenCVE Enrichment
No data.
EUVD
Github GHSA