{"vulnerability": "CVE-2021-22146", "sightings": [{"uuid": "effc2bcd-1aa0-4d49-9532-9e4524b3b2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22146", "type": "seen", "source": "https://t.me/arpsyndicate/3240", "content": "#ExploitObserverAlert\n\nCVE-2021-22146\n\nDESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to CVE-2021-22146. All versions of Elastic Cloud Enterprise has the Elasticsearch \u201canonymous\u201d user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.\n\nFIRST-EPSS: 0.015230000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T06:55:40.000000Z"}, {"uuid": "8a399324-51a8-4a04-92f5-4028419e1ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22146", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3937", "content": "#exploit\nCVE-2021-22146:\nElasticsearch ECE 7.13.x - The manipulation with an unknown input leads to a privilege escalation vulnerability (PoC)\nhttps://github.com/magichk/cve-2021-22146", "creation_timestamp": "2021-07-28T11:01:01.000000Z"}]}