| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.elasticsearch.plugin:x-pack-security | maven | < 8.19.9 | 8.19.9 |
| org.elasticsearch.plugin:x-pack-security | maven | >= 9.0.0, < 9.1.9 | 9.1.9 |
| org.elasticsearch.plugin:x-pack-security | maven | >= 9.2.0, < 9.2.3 | 9.2.3 |
The vulnerability lies in the lack of input validation on the size of user profile data. The provided patches clearly show that the updateProfileData method in org.elasticsearch.xpack.security.profile.ProfileService is the point where this vulnerability is addressed. The original implementation of this method processed user profile updates without any size checks. The patch rectifies this by introducing a new setting xpack.security.profile.max_size and a new method validateProfileSize which is called from within updateProfileData. An attacker exploiting this vulnerability would be calling the API endpoint that triggers the updateProfileData method, making it the primary function that would appear in a runtime profile during exploitation. The other changes in the commits are supporting changes for this fix, such as adding the setting and test cases.
org.elasticsearch.xpack.security.profile.ProfileService.updateProfileDatax-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/profile/ProfileService.java