Lucene search

K
freebsdFreeBSD026759E0-1BA3-11E5-B43D-002590263BF5
HistoryFeb 11, 2015 - 12:00 a.m.

elasticsearch -- remote OS command execution via Groovy scripting engine

2015-02-1100:00:00
vuxml.freebsd.org
36

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.86 High

EPSS

Percentile

98.5%

Elastic reports:

Vulnerability Summary: Elasticsearch versions 1.3.0-1.3.7 and
1.4.0-1.4.2 have vulnerabilities in the Groovy scripting engine that
were introduced in 1.3.0. The vulnerability allows an attacker to
construct Groovy scripts that escape the sandbox and execute shell
commands as the user running the Elasticsearch Java VM.
Remediation Summary: Users should upgrade to 1.3.8 or 1.4.3. Users
that do not want to upgrade can address the vulnerability by setting
script.groovy.sandbox.enabled to false in elasticsearch.yml and
restarting the node.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchelasticsearch=Β 1.3.0UNKNOWN
FreeBSDanynoarchelasticsearch<Β 1.3.8UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.86 High

EPSS

Percentile

98.5%