The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/ | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/534689/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/72585 | Broken Link Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:0868 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100850 | Third Party Advisory VDB Entry |
https://www.elastic.co/community/security/ | Not Applicable Vendor Advisory |
Configurations
History
No history.
Information
Published : 2015-02-17 15:59
Updated : 2024-07-16 17:56
NVD link : CVE-2015-1427
Mitre link : CVE-2015-1427
CVE.ORG link : CVE-2015-1427
JSON object : View
Products Affected
redhat
- fuse
elastic
- elasticsearch
CWE