Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"ignore_malformed":true not work,put date [2021-01-21T19:47Z] error #82081

Closed
hktalent opened this issue Dec 25, 2021 · 4 comments
Closed

"ignore_malformed":true not work,put date [2021-01-21T19:47Z] error #82081

hktalent opened this issue Dec 25, 2021 · 4 comments
Labels
>bug needs:triage Requires assignment of a team area label

Comments

@hktalent
Copy link

bin/elasticsearch --version
Version: 7.16.2, Build: default/docker/2b937c44140b6559905130a8650c64dbd0879cfb/2021-12-18T19:42:46.604893745Z, JVM: 17.0.1

curl -v -H 'Content-Type:application/json' -o- -XPUT http://127.0.0.1:9200/cve_index/_mapping -d '{
    "properties": {
      "lastModifiedDate": {
        "type": "date",

	"ignore_malformed":true
              }
    }
}'


CVE-2021-0202 put not ok{
  "error": {
    "root_cause": [
      {
        "type": "mapper_parsing_exception",
        "reason": "failed to parse field [lastModifiedDate] of type [date] in document with id 'CVE-2021-0202'. Preview of field's value: ''"
      }
    ],
    "type": "mapper_parsing_exception",
    "reason": "failed to parse field [lastModifiedDate] of type [date] in document with id 'CVE-2021-0202'. Preview of field's value: ''",
    "caused_by": {
      "type": "json_e_o_f_exception",
      "reason": "Unexpected end-of-input in VALUE_STRING\n at [Source: (ByteArrayInputStream); line: 1, column: 6450]"
    }
  },
  "status": 400
}
-------------------------
put data:
-------------------------

{
  "error": {
    "root_cause": [
      {
        "type": "mapper_parsing_exception",
        "reason": "failed to parse field [lastModifiedDate] of type [date] in document with id 'CVE-2021-0202'. Preview of field's value: ''"
      }
    ],
    "type": "mapper_parsing_exception",
    "reason": "failed to parse field [lastModifiedDate] of type [date] in document with id 'CVE-2021-0202'. Preview of field's value: ''",
    "caused_by": {
      "type": "json_e_o_f_exception",
      "reason": "Unexpected end-of-input in VALUE_STRING\n at [Source: (ByteArrayInputStream); line: 1, column: 6450]"
    }
  },
  "status": 400
}
{
  "cve": {
    "data_type": "CVE",
    "data_format": "MITRE",
    "data_version": "4.0",
    "CVE_data_meta": {
      "ID": "CVE-2021-0202",
      "ASSIGNER": "[email protected]"
    },
    "problemtype": {
      "problemtype_data": [
        {
          "description": [
            {
              "lang": "en",
              "value": "CWE-400"
            }
          ]
        }
      ]
    },
    "references": {
      "reference_data": [
        {
          "url": "https://kb.juniper.net/JSA11092",
          "name": "https://kb.juniper.net/JSA11092",
          "refsource": "CONFIRM",
          "tags": [
            "Vendor Advisory"
          ]
        }
      ]
    },
    "description": {
      "description_data": [
        {
          "lang": "en",
          "value": "On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1."
        }
      ]
    }
  },
  "configurations": {
    "CVE_data_version": "4.0",
    "nodes": [
      {
        "operator": "AND",
        "children": [
          {
            "operator": "OR",
            "children": [],
            "cpe_match": [
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                "cpe_name": []
              }
            ]
          },
          {
            "operator": "OR",
            "children": [],
            "cpe_match": [
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                "cpe_name": []
              }
            ]
          }
        ],
        "cpe_match": []
      }
    ]
  },
  "impact": {
    "baseMetricV3": {
      "cvssV3": {
        "version": "3.1",
        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
        "attackVector": "NETWORK",
        "attackComplexity": "LOW",
        "privilegesRequired": "NONE",
        "userInteraction": "NONE",
        "scope": "UNCHANGED",
        "confidentialityImpact": "NONE",
        "integrityImpact": "NONE",
        "availabilityImpact": "HIGH",
        "baseScore": 7.5,
        "baseSeverity": "HIGH"
      },
      "exploitabilityScore": 3.9,
      "impactScore": 3.6
    },
    "baseMetricV2": {
      "cvssV2": {
        "version": "2.0",
        "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
        "accessVector": "NETWORK",
        "accessComplexity": "LOW",
        "authentication": "NONE",
        "confidentialityImpact": "NONE",
        "integrityImpact": "NONE",
        "availabilityImpact": "PARTIAL",
        "baseScore": 5
      },
      "severity": "MEDIUM",
      "exploitabilityScore": 10,
      "impactScore": 2.9,
      "acInsufInfo": false,
      "obtainAllPrivilege": false,
      "obtainUserPrivilege": false,
      "obtainOtherPrivilege": false,
      "userInteractionRequired": false
    }
  },
  "publishedDate": "2021-01-15T18:15Z",
  "lastModifiedDate": "2021-01-21T19:47Z"
}

@hktalent hktalent added >bug needs:triage Requires assignment of a team area label labels Dec 25, 2021
@hktalent hktalent changed the title "ignore_malformed":true not work "ignore_malformed":true not work,put date [2021-01-21T19:47Z] error Dec 25, 2021
@hktalent
Copy link
Author

http://127.0.0.1:9200/cve_index/_settings?pretty

{
  "cve_index" : {
    "settings" : {
      "index" : {
        "routing" : {
          "allocation" : {
            "include" : {
              "_tier_preference" : "data_content"
            }
          }
        },
        "mapping" : {
          "ignore_malformed" : "true"
        },
        "number_of_shards" : "1",
        "provided_name" : "cve_index",
        "creation_date" : "1637565617512",
        "number_of_replicas" : "1",
        "uuid" : "nTdwUcnOS46ZtvC4ADgGTw",
        "version" : {
          "created" : "7140299"
        }
      }
    }
  }
}

@hktalent
Copy link
Author

error:

  "error": {
    "root_cause": [
      {
        "type": "mapper_parsing_exception",
        "reason": "failed to parse"
      }
    ],
    "type": "mapper_parsing_exception",
    "reason": "failed to parse",
    "caused_by": {
      "type": "json_e_o_f_exception",
      "reason": "Unexpected end-of-input: expected close marker for Object (start marker at [Source: (ByteArrayInputStream); line: 1, column: 1])\n at [Source: (ByteArrayInputStream); line: 1, column: 6438]"
    }
  },
  "status": 400
}

put data:

{
  "cve": {
    "data_type": "CVE",
    "data_format": "MITRE",
    "data_version": "4.0",
    "CVE_data_meta": {
      "ID": "CVE-2021-0202",
      "ASSIGNER": "[email protected]"
    },
    "problemtype": {
      "problemtype_data": [
        {
          "description": [
            {
              "lang": "en",
              "value": "CWE-400"
            }
          ]
        }
      ]
    },
    "references": {
      "reference_data": [
        {
          "url": "https://kb.juniper.net/JSA11092",
          "name": "https://kb.juniper.net/JSA11092",
          "refsource": "CONFIRM",
          "tags": [
            "Vendor Advisory"
          ]
        }
      ]
    },
    "description": {
      "description_data": [
        {
          "lang": "en",
          "value": "On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1."
        }
      ]
    }
  },
  "configurations": {
    "CVE_data_version": "4.0",
    "nodes": [
      {
        "operator": "AND",
        "children": [
          {
            "operator": "OR",
            "children": [],
            "cpe_match": [
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": true,
                "cpe23Uri": "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                "cpe_name": []
              }
            ]
          },
          {
            "operator": "OR",
            "children": [],
            "cpe_match": [
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                "cpe_name": []
              },
              {
                "vulnerable": false,
                "cpe23Uri": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                "cpe_name": []
              }
            ]
          }
        ],
        "cpe_match": []
      }
    ]
  },
  "impact": {
    "baseMetricV3": {
      "cvssV3": {
        "version": "3.1",
        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
        "attackVector": "NETWORK",
        "attackComplexity": "LOW",
        "privilegesRequired": "NONE",
        "userInteraction": "NONE",
        "scope": "UNCHANGED",
        "confidentialityImpact": "NONE",
        "integrityImpact": "NONE",
        "availabilityImpact": "HIGH",
        "baseScore": 7.5,
        "baseSeverity": "HIGH"
      },
      "exploitabilityScore": 3.9,
      "impactScore": 3.6
    },
    "baseMetricV2": {
      "cvssV2": {
        "version": "2.0",
        "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
        "accessVector": "NETWORK",
        "accessComplexity": "LOW",
        "authentication": "NONE",
        "confidentialityImpact": "NONE",
        "integrityImpact": "NONE",
        "availabilityImpact": "PARTIAL",
        "baseScore": 5
      },
      "severity": "MEDIUM",
      "exploitabilityScore": 10,
      "impactScore": 2.9,
      "acInsufInfo": false,
      "obtainAllPrivilege": false,
      "obtainUserPrivilege": false,
      "obtainOtherPrivilege": false,
      "userInteractionRequired": false
    }
  },
  "publishedDate": 1610734500000,
  "lastModifiedDate": 1611258420000
}

@albertzaharovits
Copy link
Contributor

@hktalent I was unable to reproduce the issue:
curl -X PUT "localhost:9200/cve_index?pretty"

curl -H 'Content-Type:application/json' -XPUT localhost:9200/cve_index/_mapping -d '{ "properties": { "lastModifiedDate": { "type": "date", "ignore_malformed":true } } }'

curl -H 'Content-Type: application/json' -XPOST localhost:9200/cve_index/_doc -d ' { "lastModifiedDate": "2021-01-21T19:47Z" } '

It goes through. It actually goes through with ignore_malformed false as well.

Is this maybe related to #12366 ?
Are you indexing an object instead of a date?

I'm going to close this because I was not able to reproduce.
Please, I would appreciate if you could reissue this with a working reproduction.

@hktalent
Copy link
Author

@albertzaharovits
Thank you, I have converted the date into a number for processing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>bug needs:triage Requires assignment of a team area label
Projects
None yet
Development

No branches or pull requests

2 participants