Hi Elastic community,
Hope everyone is doing well, and thank you for your support so far.
We’ve encountered a vulnerability related to incoming HTTP requests. We're currently using cURL APIs to create users in Elasticsearch. The host we're using is elksip.til.com:9200
, which points to a load balancer hosted on Azure.
During a recent VAPT (Vulnerability Assessment and Penetration Testing), our security team used Burp Suite for testing. They found that even when the Host
header was modified to a malicious domain like www.hackers.com
, the request was still processed successfully and the user was created — without any errors.
We would like to restrict access so that only requests with the correct Host
header (i.e., elksip.til.com:9200
) are allowed.
How can we enforce this validation in Elasticsearch 7.11? Is there any recommended way to ensure only requests with the expected Host header are processed?
Looking forward to your guidance.
Thanks!