logo

CVE-2015-1427 org.elasticsearch:elasticsearch

Package

Manager: maven
Name: org.elasticsearch:elasticsearch
Vulnerable Version: >=0 <1.3.8 || >=1.4.0 <1.4.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.93024 pctl0.9977

Details

Improper Access Control in Elasticsearch The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

Metadata

Created: 2022-05-14T02:49:44Z
Modified: 2022-07-06T20:26:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w94p-6mhw-4qxw/GHSA-w94p-6mhw-4qxw.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-w94p-6mhw-4qxw
Finding: F039
Auto approve: 1