Security
- [LES] Elastic's Response to Log4j Exploit (CVE-2021-44228)
 - ClamAV HFS+ Aviso de seguridad: CVE-2023-20032
 - Dec 16 Liferay’s Update about Log4j vulnerabilities CVE-2021-4104, CVE-2021-44228 and CVE-2021-45046
 - Dec 18 Liferay’s Update about Log4j CVE-2021-45105
 - Delayed: Disabling TLS 1.0 for Inbound Traffic on Liferay Services and Websites
 - Disabling TLS 1.0 for Inbound Traffic on Liferay Services and Websites
 - Elasticsearch and Liferay Enterprise Search Security Advisory: 2018 November
 - Elasticsearch and Liferay Enterprise Search Security Advisory: April 2, 2020
 - Elasticsearch and Liferay Enterprise Search Security Advisory: April 28, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: April 7, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: August 23, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: August 5, 2020
 - Elasticsearch and Liferay Enterprise Search Security Advisory: Dec 11, 2021 (Log4j2, CVE-2021-44228, CVE-2021-45046,CVE-2021-45105)
 - Elasticsearch and Liferay Enterprise Search Security Advisory: February 2019
 - Elasticsearch and Liferay Enterprise Search Security Advisory: January 15, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: January 16, 2020
 - Elasticsearch and Liferay Enterprise Search Security Advisory: July 12, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: July 23, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: June 2, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: June 4, 2020
 - Elasticsearch and Liferay Enterprise Search Security Advisory: March 2020
 - Elasticsearch and Liferay Enterprise Search Security Advisory: March 9, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: Nov 12, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: October 2019
 - Elasticsearch and Liferay Enterprise Search Security Advisory: October 22, 2020
 - Elasticsearch and Liferay Enterprise Search Security Advisory: Sept 2, 2021
 - Elasticsearch and Liferay Enterprise Search Security Advisory: September 2, 2020
 - Elastic Security Statement for CVE-2024-3094, xz versions 5.6.0 and 5.6.1
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-1364
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-23707
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-23708, CVE-2022-23709, CVE-2022-23710
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-23711
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-23713
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-38779
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-38900
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2023-1370
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2023-31414, CVE-2023-31415, CVE-2023-26486, CVE-2023-26487
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2023-31417
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2023-31418, CVE-2023-31419, CVE-2023-31422
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2023-46671, CVE-2023-46673
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2023-46675, CVE-2023-49921
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-12539
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-12556, CVE-2024-52974, CVE-2024-52980, CVE-2024-52981
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-23445, CVE-2024-37279, CVE-2024-37280, CVE-2024-23442, CVE-2024-23443, CVE-2024-2887, CVE-2024-37281, CVE-2024-37287, CVE-2024-23444
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-23446, CVE-2023-7024
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-23449
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-23450
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-37285, CVE-2024-37288
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-43706, CVE-2025-2135, CVE-2025-25012 (Kibana)
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2024-43709, CVE-2024-52973, CVE-2024-43710, CVE-2024-43707, CVE-2024-52972, CVE-2024-43708
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2025-25012
 - Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2025-25014, CVE-2024-52979, CVE-2024-11390, CVE-2025-25016
 - Elastic Stack and Liferay Enterprise Search Security Advisory: Security Statement for OpenSSL CVE-2022-3786 and CVE-2022-3602, OpenSSL version 3.0.7
 - Elastic Stack and Liferay Enterprise Search Security Advisory: Security Statement for Oracle July Critical Patch Update CVE-2022-21540, CVE-2022-21541, CVE-2022-21549, CVE-2022-25647, CVE-2022-34169
 - Elastic Stack and Liferay Enterprise Search Security Advisory: Security Statement regarding CVE-2022-1471
 - Follow-Up Security Alert for LSV-412 and LSV-545
 - Jenkins Security Advisory 2024-01-24: CVE-2024-23897
 - Liferay Cloud Security Alert: June 2019
 - Liferay Enterprise Search Support Alert: Action Required by June 24 2019
 - Liferay SaaS Security Alert: March 2020
 - Liferay Security Alert: 2018 August
 - Liferay Security Alert: 2019 January
 - Liferay Security Alert: 2019 June
 - Liferay Security Alert: 2019 November
 - Liferay Security Alert: 2019 October
 - Liferay Security Alert: 2020 February
 - Liferay Security Alert: 2020 July
 - Liferay Security Alert: 2020 March
 - Liferay Security Alert: 2020 May
 - Liferay Security Alert: 2021 April
 - Liferay Security Alert: 2022 April
 - Liferay Security Alert: December 2018
 - Liferay Security Alert for Liferay DXP
 - Liferay’s Statement about CVE-2021-44228 (Log4j vulnerability)
 - Liferay’s Statement about recent Log4j vulnerabilities
 - Reminder: Follow-Up Security Alert for LSV-412 and LSV-545
 - Spring4Shell and Spring Cloud Security Advisory
 - TLS 1.0 Disabled for Inbound Traffic on Liferay Services and Websites
 - Update: Log4j Security Advisory
 
Elastic Stack and Liferay Enterprise Search Security Advisory: CVE-2022-23708, CVE-2022-23709, CVE-2022-23710
The following issues may affect the functionality of your Liferay DXP, Liferay Enterprise Search environment and your Elastic Stack.
Deployments which might be impacted
- Elasticsearch 7.16.0-7.17.0
 - Kibana 7.7.0-7.17.0
 
Vulnerability Information
Elasticsearch privilege escalation issue (ESA-2022-02)
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index.
Affected Versions:
Versions 7.16.0 through 7.17.0.
Solutions and Mitigations:
Users running a cluster on an affected version that had previously been upgraded from 6.x, should upgrade to 7.17.1. Users that are planning to upgrade from 6.x should not perform an upgrade from 6.x to versions 7.16 through 7.17.0 and should use 7.17.1+ for upgrades from 6.x.
CVSSv3:
6.8 (Medium) - AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CVE ID:
CVE-2022-23708
Kibana missing authorization issue (ESA-2022-03)
A flaw was discovered in Kibana in which users with Read access to the Uptime feature could modify alerting rules. A user with this privilege would be able to create new alerting rules or overwrite existing ones. However, any new or modified rules would not be enabled, and a user with this privilege could not modify alerting connectors. This effectively means that Read users could disable existing alerting rules.
Affected Versions:
Versions 7.7.0 through 7.17.0, and 8.0.0.
Solutions and Mitigations:
The issue is fixed in 7.17.1, 8.01, and 8.1.0.
As mitigation, users on affected versions can avoid granting users Read access to the Uptime feature if they should not be able to otherwise create/modify alerts, and avoid using the built-in Viewer role.
CVSSv3:
4.3 (Medium) - AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE ID:
CVE-2022-23709
Kibana cross-site-scripting (XSS) issue (ESA-2022-04)
A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser.
Affected Versions:
For self-managed deployments the issue impacts versions 7.15.0, 7.15.1, and 7.15.2
For Elastic Cloud Services the issue impacts versions 7.15.0 through 7.17.0, and 8.0.0.
Solutions and Mitigations:
This is fixed in 7.17.1, 8.0.1, and 8.1.0.
As mitigation, users on affected versions can avoid granting users All access to the Index Pattern Management and Saved Object Management features if they should not be able to otherwise create/modify index patterns. Note: index patterns are called data views starting in 8.0.
CVSSv3:
5.4 (Medium) - AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
CVE ID:
CVE-2022-23710
Additional Information
Liferay DXP's Sidecar Elasticsearch server (suitable for local development and testing purposes only!) is not affected because existing Sidecar installations are never upgraded directly (in the sense of Elasticsearch Upgrade): instead, there is always a fresh, new distribution extracted into [Liferay Home]/elasticsearch-sidecar (DXP 7.4) or [Liferay Home]/elasticsearch7 (DXP 7.3) each time we upgrade the Sidecar Elasticsearch server version (for example from 7.14.1 to 7.17.0) or when Liferay DXP is configured to use the Sidecar mode and the runtime folder is not present. In addition to it, the Sidecar Elasticsearch servers are configured programmatically to operate with X-Pack Security features disabled, therefore there cannot be security indexes created.
Search Engine Compatibility Matrix
Elasticsearch 7.17.x has recently been added to the list of compatible versions. Reference the information here for the detailed Elasticsearch compatibility including the compatible connector versions and required patch levels.
Vendor References
https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447
Elastic, Elasticsearch, and X-Pack are trademarks of Elasticsearch BV, registered in the U.S. and in other countries.