CVE-2015-1427
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/02/2015
Last modified:
12/04/2025
Description
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:* | 1.3.8 (excluding) | |
cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:* | 1.4.0 (including) | 1.4.3 (excluding) |
cpe:2.3:a:redhat:fuse:1.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html
- http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html
- http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/
- http://www.securityfocus.com/archive/1/534689/100/0/threaded
- http://www.securityfocus.com/bid/72585
- https://access.redhat.com/errata/RHSA-2017:0868
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100850
- https://www.elastic.co/community/security/
- http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html
- http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html
- http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/
- http://www.securityfocus.com/archive/1/534689/100/0/threaded
- http://www.securityfocus.com/bid/72585
- https://access.redhat.com/errata/RHSA-2017:0868
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100850
- https://www.elastic.co/community/security/