// For flags

CVE-2014-3120

Elasticsearch Remote Code Execution Vulnerability

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

11
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.

La configuración por defecto en Elasticsearch anterior a 1.2 habilita secuencias de comandos dinámicos, lo que permite a atacantes remotos ejecutar expresiones MVEL arbitrarias y código Java a través del parámetro source en _search. NOTA: esto solamente viola la política de seguridad del proveedor si el usuario no hace funcionar Elasticsearch en su propia maquina virtual independiente.

It was discovered that the default configuration of Elasticsearch enabled dynamic scripting, allowing a remote attacker to execute arbitrary MVEL expressions and Java code via the source parameter passed to _search.

Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-09 First Exploit
  • 2014-04-29 CVE Reserved
  • 2014-05-14 CVE Published
  • 2022-03-25 Exploited in Wild
  • 2022-04-15 KEV Due Date
  • 2024-08-06 CVE Updated
  • 2024-09-13 EPSS Updated
CWE
  • CWE-284: Improper Access Control
  • CWE-749: Exposed Dangerous Method or Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elasticsearch
Search vendor "Elasticsearch"
Elasticsearch
Search vendor "Elasticsearch" for product "Elasticsearch"
<= 1.1.1
Search vendor "Elasticsearch" for product "Elasticsearch" and version " <= 1.1.1"
-
Affected