CVE-2014-3120
Elasticsearch Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
13Exploited in Wild
YesDecision
Descriptions
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
La configuración por defecto en Elasticsearch anterior a 1.2 habilita secuencias de comandos dinámicos, lo que permite a atacantes remotos ejecutar expresiones MVEL arbitrarias y código Java a través del parámetro source en _search. NOTA: esto solamente viola la política de seguridad del proveedor si el usuario no hace funcionar Elasticsearch en su propia maquina virtual independiente.
It was discovered that the default configuration of Elasticsearch enabled dynamic scripting, allowing a remote attacker to execute arbitrary MVEL expressions and Java code via the source parameter passed to _search.
The katello-configure package provides the katello-configure script, which configures the Katello installation, and the katello-upgrade script, which handles upgrades between versions. It was discovered that the default configuration of Elasticsearch enabled dynamic scripting, allowing a remote attacker to execute arbitrary MVEL expressions and Java code via the source parameter passed to _search. All Subscription Asset Manager users are advised to upgrade to this updated package. The update provides a script that modifies the elasticsearch.yml configuration file to disable dynamic scripting. After updating, run the "katello-configure" command. This will update the elasticsearch.yml configuration file and restart the elasticsearch service.
Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2014-04-29 CVE Reserved
- 2014-05-13 First Exploit
- 2014-05-14 CVE Published
- 2022-03-25 Exploited in Wild
- 2022-04-15 KEV Due Date
- 2025-02-10 CVE Updated
- 2025-03-30 EPSS Updated
CWE
- CWE-284: Improper Access Control
- CWE-749: Exposed Dangerous Method or Function
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://www.osvdb.org/106949 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/126609 | 2014-05-14 | |
https://packetstorm.news/files/id/126863 | 2014-05-30 | |
https://packetstorm.news/files/id/127689 | 2014-07-30 | |
https://www.exploit-db.com/exploits/33588 | 2014-05-30 | |
https://www.exploit-db.com/exploits/33370 | 2014-05-15 | |
https://github.com/echohtp/ElasticSearch-CVE-2014-3120 | 2014-07-07 | |
https://github.com/xpgdgit/CVE-2014-3120 | 2022-08-01 | |
https://github.com/jeffgeiger/es_inject | 2014-05-13 | |
http://bouk.co/blog/elasticsearch-rce | 2025-02-10 | |
http://www.exploit-db.com/exploits/33370 | 2025-02-10 | |
http://www.rapid7.com/db/modules/exploit/multi/elasticsearch/script_mvel_rce | 2025-02-10 | |
http://www.securityfocus.com/bid/67731 | 2025-02-10 | |
https://www.found.no/foundation/elasticsearch-security/#staying-safe-while-developing-with-elasticsearch | 2025-02-10 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.elastic.co/blog/logstash-1-4-3-released | 2016-12-06 | |
https://www.elastic.co/community/security | 2016-12-06 | |
https://access.redhat.com/security/cve/CVE-2014-3120 | 2014-09-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1124252 | 2014-09-11 | |
https://access.redhat.com/solutions/1191453 | 2014-09-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Elasticsearch Search vendor "Elasticsearch" | Elasticsearch Search vendor "Elasticsearch" for product "Elasticsearch" | <= 1.1.1 Search vendor "Elasticsearch" for product "Elasticsearch" and version " <= 1.1.1" | - |
Affected
|