// For flags

CVE-2015-1427

Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

6
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

El motor de secuencias de comandos Groovy en Elasticsearch anterior a 1.3.8 y 1.4.x anterior a 1.4.3 permite a atacantes remotos evadir el mecanismo de protección de sandbox y ejecutar comandos de shell arbitrarios a través de una secuencia de comandos manipulada.

It was reported that Elasticsearch versions 1.3.0-1.3.7 and 1.4.0-1.4.2 have vulnerabilities in the Groovy scripting engine. The vulnerability allows an attacker to construct Groovy scripts that escape the sandbox and execute shell commands as the user running the Elasticsearch Java VM.

The Groovy scripting engine in Elasticsearch allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-01-31 CVE Reserved
  • 2015-02-11 CVE Published
  • 2015-03-11 First Exploit
  • 2022-03-25 Exploited in Wild
  • 2022-04-15 KEV Due Date
  • 2024-08-06 CVE Updated
  • 2024-11-13 EPSS Updated
CWE
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elasticsearch
Search vendor "Elasticsearch"
Elasticsearch
Search vendor "Elasticsearch" for product "Elasticsearch"
<= 1.3.7
Search vendor "Elasticsearch" for product "Elasticsearch" and version " <= 1.3.7"
-
Affected
Elasticsearch
Search vendor "Elasticsearch"
Elasticsearch
Search vendor "Elasticsearch" for product "Elasticsearch"
1.4.0
Search vendor "Elasticsearch" for product "Elasticsearch" and version "1.4.0"
-
Affected
Elasticsearch
Search vendor "Elasticsearch"
Elasticsearch
Search vendor "Elasticsearch" for product "Elasticsearch"
1.4.0
Search vendor "Elasticsearch" for product "Elasticsearch" and version "1.4.0"
beta1
Affected
Elasticsearch
Search vendor "Elasticsearch"
Elasticsearch
Search vendor "Elasticsearch" for product "Elasticsearch"
1.4.1
Search vendor "Elasticsearch" for product "Elasticsearch" and version "1.4.1"
-
Affected
Elasticsearch
Search vendor "Elasticsearch"
Elasticsearch
Search vendor "Elasticsearch" for product "Elasticsearch"
1.4.2
Search vendor "Elasticsearch" for product "Elasticsearch" and version "1.4.2"
-
Affected