CVE-2014-3120
Elasticsearch Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
10Exploited in Wild
YesDecision
Descriptions
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
La configuración por defecto en Elasticsearch anterior a 1.2 habilita secuencias de comandos dinámicos, lo que permite a atacantes remotos ejecutar expresiones MVEL arbitrarias y código Java a través del parámetro source en _search. NOTA: esto solamente viola la política de seguridad del proveedor si el usuario no hace funcionar Elasticsearch en su propia maquina virtual independiente.
It was discovered that the default configuration of Elasticsearch enabled dynamic scripting, allowing a remote attacker to execute arbitrary MVEL expressions and Java code via the source parameter passed to _search.
Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-04-29 CVE Reserved
- 2014-05-14 CVE Published
- 2014-05-14 First Exploit
- 2022-03-25 Exploited in Wild
- 2022-04-15 KEV Due Date
- 2024-08-06 CVE Updated
- 2024-09-13 EPSS Updated
CWE
- CWE-284: Improper Access Control
- CWE-749: Exposed Dangerous Method or Function
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://www.osvdb.org/106949 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://github.com/jeffgeiger/es_inject | 2014-05-14 | |
https://www.exploit-db.com/exploits/33588 | 2014-05-30 | |
https://www.exploit-db.com/exploits/33370 | 2014-05-15 | |
https://github.com/echohtp/ElasticSearch-CVE-2014-3120 | 2014-07-07 | |
https://github.com/xpgdgit/CVE-2014-3120 | 2022-08-01 | |
http://bouk.co/blog/elasticsearch-rce | 2024-08-06 | |
http://www.exploit-db.com/exploits/33370 | 2024-08-06 | |
http://www.rapid7.com/db/modules/exploit/multi/elasticsearch/script_mvel_rce | 2024-08-06 | |
http://www.securityfocus.com/bid/67731 | 2024-08-06 | |
https://www.found.no/foundation/elasticsearch-security/#staying-safe-while-developing-with-elasticsearch | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.elastic.co/blog/logstash-1-4-3-released | 2016-12-06 | |
https://www.elastic.co/community/security | 2016-12-06 | |
https://access.redhat.com/security/cve/CVE-2014-3120 | 2014-09-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1124252 | 2014-09-11 | |
https://access.redhat.com/solutions/1191453 | 2014-09-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Elasticsearch Search vendor "Elasticsearch" | Elasticsearch Search vendor "Elasticsearch" for product "Elasticsearch" | <= 1.1.1 Search vendor "Elasticsearch" for product "Elasticsearch" and version " <= 1.1.1" | - |
Affected
|