{"vulnerability": "CVE-2021-2214", "sightings": [{"uuid": "58911733-e7a2-46ed-a086-4365d2081bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22145", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "93668a40-f01f-4032-b587-240534e0aec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22144", "type": "seen", "source": "https://t.me/arpsyndicate/3231", "content": "#ExploitObserverAlert\n\nCVE-2021-22144\n\nDESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2021-22144. In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.\n\nFIRST-EPSS: 0.001380000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2024-01-28T06:25:10.000000Z"}, {"uuid": "3dfbe13b-194a-4a2f-89cd-5c884df02e68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22145", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:34.000000Z"}, {"uuid": "7b893c94-5b0d-40ad-92fe-8b2085b12151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22145", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:12:59.000000Z"}, {"uuid": "bdb6dff9-3017-4e55-b5af-ff2faf948781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22145", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/elasticsearch_memory_disclosure.rb", "content": "", "creation_timestamp": "2023-09-07T15:26:52.000000Z"}, {"uuid": "effc2bcd-1aa0-4d49-9532-9e4524b3b2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22146", "type": "seen", "source": "https://t.me/arpsyndicate/3240", "content": "#ExploitObserverAlert\n\nCVE-2021-22146\n\nDESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to CVE-2021-22146. All versions of Elastic Cloud Enterprise has the Elasticsearch \u201canonymous\u201d user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.\n\nFIRST-EPSS: 0.015230000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T06:55:40.000000Z"}, {"uuid": "bd4ec08d-3d92-4bd6-9e34-10e2959a974b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22144", "type": "seen", "source": "https://t.me/cibsecurity/26486", "content": "\u203c CVE-2021-22144 \u203c\n\nIn Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-26T16:11:33.000000Z"}, {"uuid": "8a399324-51a8-4a04-92f5-4028419e1ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22146", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3937", "content": "#exploit\nCVE-2021-22146:\nElasticsearch ECE 7.13.x - The manipulation with an unknown input leads to a privilege escalation vulnerability (PoC)\nhttps://github.com/magichk/cve-2021-22146", "creation_timestamp": "2021-07-28T11:01:01.000000Z"}]}