CVE-2015-4165
Elasticsearch 1.5.2 File Creation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The snapshot API in Elasticsearch before 1.6.0 when another application exists on the system that can read Lucene files and execute code from them, is accessible by the attacker, and the Java VM on which Elasticsearch is running can write to a location that the other application can read and execute from, allows remote authenticated users to write to and create arbitrary snapshot metadata files, and potentially execute arbitrary code.
La API snapshot en Elasticsearch en versiones anteriores a la 1.6.0, cuando otra aplicación existe en el sistema que puede leer archivos Lucene y ejecutar código desde los mismos, se vuelve accesible para el atacante. Además, la máquina virtual Java VM desde la que se está ejecutando Elasticsearch puede escribir en una localización desde la que la otra aplicación puede leer y ejecutar. Esto permite que usuarios remotos autenticados escriban y creen archivos de metadatos snapshot arbitrarios y, potencialmente, ejecuten código arbitrario.
Elasticsearch versions 1.0.0 through 1.5.2 are vulnerable to an engineered attack on other applications on the system. The snapshot API may be used indirectly to place snapshot metadata files into locations that are writeable by the user running the Elasticsearch process. It is possible to create a file that another application could read and take action on, such as code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-06-02 CVE Reserved
- 2015-06-10 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/132234/Elasticsearch-1.5.2-File-Creation.html | Third Party Advisory |
|
http://www.securityfocus.com/archive/1/535727/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/536855/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/75113 | Mitigation | |
https://bugzilla.redhat.com/show_bug.cgi?id=1230761 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.elastic.co/community/security | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Elasticsearch Search vendor "Elasticsearch" | Elasticsearch Search vendor "Elasticsearch" for product "Elasticsearch" | 1.5.2 Search vendor "Elasticsearch" for product "Elasticsearch" and version "1.5.2" | - |
Affected
|