vendor:
ElasticSearch
by:
Darren Martyn, Xiphos Research Ltd.
9
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: ElasticSearch
Affected Version From: 1.4.2000
Affected Version To: 1.5.2002
Patch Exists: YES
Related CWE: CVE-2015-1427
CPE: a:elasticsearch:elasticsearch
Other Scripts:
https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2015-1427, https://www.infosecmatter.com/nessus-plugin-library/?id=81816, https://www.infosecmatter.com/nessus-plugin-library/?id=84409, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/elasticsearch/search_groovy_script, https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2015-1635, https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2017-8917, https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2012-1823, https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2017-5689, https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-cve2017-5638, https://www.infosecmatter.com/nmap-nse-library/?nse=http-vuln-misfortune-cookie
Tags: packetstorm,cve,cve2015,elastic,rce,elasticsearch,kev
CVSS Metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
Nuclei References:
https://blog.csdn.net/JiangBuLiu/article/details/94457980, http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/, https://nvd.nist.gov/vuln/detail/CVE-2015-1427, http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html, https://access.redhat.com/errata/RHSA-2017:0868
Nuclei Metadata: {'max-request': 2, 'vendor': 'elasticsearch', 'product': 'elasticsearch'}
Platforms Tested: Linux, Windows, Mac
2015
ElasticSearch Exploit, CVE-2015-1427
ElasticSearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script to the Groovy scripting engine.
Mitigation:
The best way to mitigate this vulnerability is to ensure that the ElasticSearch server is running the latest version of the software, and that all security patches are applied.